Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22960
Vulnerability from cvelistv5
Published
2021-11-03 19:22
Modified
2024-08-03 18:58
Severity ?
EPSS score ?
Summary
The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/1238099 | Exploit, Issue Tracking, Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2022/dsa-5170 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1238099 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5170 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/nodejs/llhttp |
Version: Fixed in v2.1.4 and v6.0.6 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:58:26.117Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://hackerone.com/reports/1238099", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { name: "DSA-5170", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2022/dsa-5170", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "https://github.com/nodejs/llhttp", vendor: "n/a", versions: [ { status: "affected", version: "Fixed in v2.1.4 and v6.0.6", }, ], }, ], descriptions: [ { lang: "en", value: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-444", description: "HTTP Request Smuggling (CWE-444)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-06-28T10:06:19", orgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", shortName: "hackerone", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://hackerone.com/reports/1238099", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { name: "DSA-5170", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2022/dsa-5170", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "support@hackerone.com", ID: "CVE-2021-22960", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "https://github.com/nodejs/llhttp", version: { version_data: [ { version_value: "Fixed in v2.1.4 and v6.0.6", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "HTTP Request Smuggling (CWE-444)", }, ], }, ], }, references: { reference_data: [ { name: "https://hackerone.com/reports/1238099", refsource: "MISC", url: "https://hackerone.com/reports/1238099", }, { name: "https://www.oracle.com/security-alerts/cpujan2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { name: "DSA-5170", refsource: "DEBIAN", url: "https://www.debian.org/security/2022/dsa-5170", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "36234546-b8fa-4601-9d6f-f4e334aa8ea1", assignerShortName: "hackerone", cveId: "CVE-2021-22960", datePublished: "2021-11-03T19:22:42", dateReserved: "2021-01-06T00:00:00", dateUpdated: "2024-08-03T18:58:26.117Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*\", \"versionEndExcluding\": \"2.1.4\", \"matchCriteriaId\": \"6B7CB576-CA48-462E-A360-6CE14FADCC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndExcluding\": \"6.0.6\", \"matchCriteriaId\": \"AF1511BB-A1F0-4AF9-80C3-5EB6317F8525\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"9F300E13-1B40-4B35-ACA5-4D402CD41055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"B10E38A6-783C-45A2-98A1-12FA1EB3D3AA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n parse en llhttp versiones anteriores a 2.1.4 y versiones anteriores a 6.0.6. ignora las extensiones chunk cuando analiza el cuerpo de las peticiones chunked. Esto conlleva a un Contrabando de Peticiones HTTP (HRS) bajo determinadas condiciones\"}]", id: "CVE-2021-22960", lastModified: "2024-11-21T05:51:01.460", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 2.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2021-11-03T20:15:08.247", references: "[{\"url\": \"https://hackerone.com/reports/1238099\", \"source\": \"support@hackerone.com\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5170\", \"source\": \"support@hackerone.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"source\": \"support@hackerone.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://hackerone.com/reports/1238099\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5170\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]", sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"support@hackerone.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-444\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-444\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2021-22960\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2021-11-03T20:15:08.247\",\"lastModified\":\"2024-11-21T05:51:01.460\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.\"},{\"lang\":\"es\",\"value\":\"La función parse en llhttp versiones anteriores a 2.1.4 y versiones anteriores a 6.0.6. ignora las extensiones chunk cuando analiza el cuerpo de las peticiones chunked. Esto conlleva a un Contrabando de Peticiones HTTP (HRS) bajo determinadas condiciones\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2.1.4\",\"matchCriteriaId\":\"6B7CB576-CA48-462E-A360-6CE14FADCC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"6.0.6\",\"matchCriteriaId\":\"AF1511BB-A1F0-4AF9-80C3-5EB6317F8525\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"9F300E13-1B40-4B35-ACA5-4D402CD41055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B10E38A6-783C-45A2-98A1-12FA1EB3D3AA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://hackerone.com/reports/1238099\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5170\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/1238099\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5170\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}", }, }
opensuse-su-2021:3940-1
Vulnerability from csaf_opensuse
Published
2021-12-06 13:43
Modified
2021-12-06 13:43
Summary
Security update for nodejs12
Notes
Title of the patch
Security update for nodejs12
Description of the patch
This update for nodejs12 fixes the following issues:
- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057).
- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056).
- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055).
- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054).
- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053).
Patchnames
openSUSE-SLE-15.3-2021-3940
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs12", title: "Title of the patch", }, { category: "description", text: "This update for nodejs12 fixes the following issues:\n\n- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).\n- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).\n- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057). \n- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056). \n- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055). \n- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054). \n- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053). \n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-3940", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3940-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:3940-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:3940-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LB7JXCGGW7EKOPAS4IDMUQPYHXS3ZUZA/", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs12", tracking: { current_release_date: "2021-12-06T13:43:51Z", generator: { date: "2021-12-06T13:43:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:3940-1", initial_release_date: "2021-12-06T13:43:51Z", revision_history: [ { date: "2021-12-06T13:43:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.aarch64", product: { name: "nodejs12-12.22.7-4.22.1.aarch64", product_id: "nodejs12-12.22.7-4.22.1.aarch64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.aarch64", product: { name: "nodejs12-devel-12.22.7-4.22.1.aarch64", product_id: "nodejs12-devel-12.22.7-4.22.1.aarch64", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.aarch64", product: { name: "npm12-12.22.7-4.22.1.aarch64", product_id: "npm12-12.22.7-4.22.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs12-docs-12.22.7-4.22.1.noarch", product: { name: "nodejs12-docs-12.22.7-4.22.1.noarch", product_id: "nodejs12-docs-12.22.7-4.22.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.ppc64le", product: { name: "nodejs12-12.22.7-4.22.1.ppc64le", product_id: "nodejs12-12.22.7-4.22.1.ppc64le", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.ppc64le", product: { name: "nodejs12-devel-12.22.7-4.22.1.ppc64le", product_id: "nodejs12-devel-12.22.7-4.22.1.ppc64le", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.ppc64le", product: { name: "npm12-12.22.7-4.22.1.ppc64le", product_id: "npm12-12.22.7-4.22.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.s390x", product: { name: "nodejs12-12.22.7-4.22.1.s390x", product_id: "nodejs12-12.22.7-4.22.1.s390x", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.s390x", product: { name: "nodejs12-devel-12.22.7-4.22.1.s390x", product_id: "nodejs12-devel-12.22.7-4.22.1.s390x", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.s390x", product: { name: "npm12-12.22.7-4.22.1.s390x", product_id: "npm12-12.22.7-4.22.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.x86_64", product: { name: "nodejs12-12.22.7-4.22.1.x86_64", product_id: "nodejs12-12.22.7-4.22.1.x86_64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.x86_64", product: { name: "nodejs12-devel-12.22.7-4.22.1.x86_64", product_id: "nodejs12-devel-12.22.7-4.22.1.x86_64", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.x86_64", product: { name: "npm12-12.22.7-4.22.1.x86_64", product_id: "npm12-12.22.7-4.22.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", }, product_reference: "nodejs12-12.22.7-4.22.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", }, product_reference: "nodejs12-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", }, product_reference: "nodejs12-12.22.7-4.22.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", }, product_reference: "nodejs12-12.22.7-4.22.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-docs-12.22.7-4.22.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", }, product_reference: "nodejs12-docs-12.22.7-4.22.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", }, product_reference: "npm12-12.22.7-4.22.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", }, product_reference: "npm12-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", }, product_reference: "npm12-12.22.7-4.22.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", }, product_reference: "npm12-12.22.7-4.22.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:nodejs12-devel-12.22.7-4.22.1.x86_64", "openSUSE Leap 15.3:nodejs12-docs-12.22.7-4.22.1.noarch", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.aarch64", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.ppc64le", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.s390x", "openSUSE Leap 15.3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:51Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
opensuse-su-2021:3964-1
Vulnerability from csaf_opensuse
Published
2021-12-07 07:57
Modified
2021-12-07 07:57
Summary
Security update for nodejs14
Notes
Title of the patch
Security update for nodejs14
Description of the patch
This update for nodejs14 fixes the following issues:
nodejs14 was updated to 14.18.1:
* deps: update llhttp to 2.1.4
- HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)
- HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)
Changes in 14.18.0:
* buffer:
+ introduce Blob
+ add base64url encoding option
* child_process:
+ allow options.cwd receive a URL
+ add timeout to spawn and fork
+ allow promisified exec to be cancel
+ add 'overlapped' stdio flag
* dns: add 'tries' option to Resolve options
* fs:
+ allow empty string for temp directory prefix
+ allow no-params fsPromises fileHandle read
+ add support for async iterators to fsPromises.writeFile
* http2: add support for sensitive headers
* process: add 'worker' event
* tls: allow reading data into a static buffer
* worker: add setEnvironmentData/getEnvironmentData
Changes in 14.17.6
* deps: upgrade npm to 6.14.15 which fixes a number of
security issues
(bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,
bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,
bsc#1190053, CVE-2021-39135)
Patchnames
openSUSE-SLE-15.3-2021-3964
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs14", title: "Title of the patch", }, { category: "description", text: "This update for nodejs14 fixes the following issues:\n\nnodejs14 was updated to 14.18.1:\n\n* deps: update llhttp to 2.1.4\n\n - HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)\n - HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)\n\nChanges in 14.18.0:\n\n * buffer:\n\n + introduce Blob\n + add base64url encoding option\n\n * child_process:\n\n + allow options.cwd receive a URL\n + add timeout to spawn and fork\n + allow promisified exec to be cancel\n + add 'overlapped' stdio flag\n\n * dns: add 'tries' option to Resolve options\n * fs:\n\n + allow empty string for temp directory prefix\n + allow no-params fsPromises fileHandle read\n + add support for async iterators to fsPromises.writeFile\n\n * http2: add support for sensitive headers\n * process: add 'worker' event\n * tls: allow reading data into a static buffer\n * worker: add setEnvironmentData/getEnvironmentData\n\nChanges in 14.17.6\n\n * deps: upgrade npm to 6.14.15 which fixes a number of\n security issues\n (bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,\n bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,\n bsc#1190053, CVE-2021-39135)\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2021-3964", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3964-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:3964-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:3964-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB6I33SJCMQ2K7LAKKPS54HRXSB7FQXG/", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs14", tracking: { current_release_date: "2021-12-07T07:57:43Z", generator: { date: "2021-12-07T07:57:43Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:3964-1", initial_release_date: "2021-12-07T07:57:43Z", revision_history: [ { date: "2021-12-07T07:57:43Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.aarch64", product: { name: "nodejs14-14.18.1-15.21.2.aarch64", product_id: "nodejs14-14.18.1-15.21.2.aarch64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.aarch64", product: { name: "nodejs14-devel-14.18.1-15.21.2.aarch64", product_id: "nodejs14-devel-14.18.1-15.21.2.aarch64", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.aarch64", product: { name: "npm14-14.18.1-15.21.2.aarch64", product_id: "npm14-14.18.1-15.21.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs14-docs-14.18.1-15.21.2.noarch", product: { name: "nodejs14-docs-14.18.1-15.21.2.noarch", product_id: "nodejs14-docs-14.18.1-15.21.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.ppc64le", product: { name: "nodejs14-14.18.1-15.21.2.ppc64le", product_id: "nodejs14-14.18.1-15.21.2.ppc64le", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.ppc64le", product: { name: "nodejs14-devel-14.18.1-15.21.2.ppc64le", product_id: "nodejs14-devel-14.18.1-15.21.2.ppc64le", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.ppc64le", product: { name: "npm14-14.18.1-15.21.2.ppc64le", product_id: "npm14-14.18.1-15.21.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.s390x", product: { name: "nodejs14-14.18.1-15.21.2.s390x", product_id: "nodejs14-14.18.1-15.21.2.s390x", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.s390x", product: { name: "nodejs14-devel-14.18.1-15.21.2.s390x", product_id: "nodejs14-devel-14.18.1-15.21.2.s390x", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.s390x", product: { name: "npm14-14.18.1-15.21.2.s390x", product_id: "npm14-14.18.1-15.21.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.x86_64", product: { name: "nodejs14-14.18.1-15.21.2.x86_64", product_id: "nodejs14-14.18.1-15.21.2.x86_64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.x86_64", product: { name: "nodejs14-devel-14.18.1-15.21.2.x86_64", product_id: "nodejs14-devel-14.18.1-15.21.2.x86_64", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.x86_64", product: { name: "npm14-14.18.1-15.21.2.x86_64", product_id: "npm14-14.18.1-15.21.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", }, product_reference: "nodejs14-14.18.1-15.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", }, product_reference: "nodejs14-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", }, product_reference: "nodejs14-14.18.1-15.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", }, product_reference: "nodejs14-14.18.1-15.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-15.21.2.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", }, product_reference: "nodejs14-docs-14.18.1-15.21.2.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", }, product_reference: "npm14-14.18.1-15.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", }, product_reference: "npm14-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", }, product_reference: "npm14-14.18.1-15.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", }, product_reference: "npm14-14.18.1-15.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:nodejs14-devel-14.18.1-15.21.2.x86_64", "openSUSE Leap 15.3:nodejs14-docs-14.18.1-15.21.2.noarch", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.aarch64", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.ppc64le", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.s390x", "openSUSE Leap 15.3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:43Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
opensuse-su-2024:11616-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
nodejs14-14.18.1-1.1 on GA media
Notes
Title of the patch
nodejs14-14.18.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the nodejs14-14.18.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11616
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "nodejs14-14.18.1-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the nodejs14-14.18.1-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11616", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11616-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "nodejs14-14.18.1-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11616-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs14-14.18.1-1.1.aarch64", product: { name: "nodejs14-14.18.1-1.1.aarch64", product_id: "nodejs14-14.18.1-1.1.aarch64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-1.1.aarch64", product: { name: "nodejs14-devel-14.18.1-1.1.aarch64", product_id: "nodejs14-devel-14.18.1-1.1.aarch64", }, }, { category: "product_version", name: "nodejs14-docs-14.18.1-1.1.aarch64", product: { name: "nodejs14-docs-14.18.1-1.1.aarch64", product_id: "nodejs14-docs-14.18.1-1.1.aarch64", }, }, { category: "product_version", name: "npm14-14.18.1-1.1.aarch64", product: { name: "npm14-14.18.1-1.1.aarch64", product_id: "npm14-14.18.1-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-1.1.ppc64le", product: { name: "nodejs14-14.18.1-1.1.ppc64le", product_id: "nodejs14-14.18.1-1.1.ppc64le", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-1.1.ppc64le", product: { name: "nodejs14-devel-14.18.1-1.1.ppc64le", product_id: "nodejs14-devel-14.18.1-1.1.ppc64le", }, }, { category: "product_version", name: "nodejs14-docs-14.18.1-1.1.ppc64le", product: { name: "nodejs14-docs-14.18.1-1.1.ppc64le", product_id: "nodejs14-docs-14.18.1-1.1.ppc64le", }, }, { category: "product_version", name: "npm14-14.18.1-1.1.ppc64le", product: { name: "npm14-14.18.1-1.1.ppc64le", product_id: "npm14-14.18.1-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-1.1.s390x", product: { name: "nodejs14-14.18.1-1.1.s390x", product_id: "nodejs14-14.18.1-1.1.s390x", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-1.1.s390x", product: { name: "nodejs14-devel-14.18.1-1.1.s390x", product_id: "nodejs14-devel-14.18.1-1.1.s390x", }, }, { category: "product_version", name: "nodejs14-docs-14.18.1-1.1.s390x", product: { name: "nodejs14-docs-14.18.1-1.1.s390x", product_id: "nodejs14-docs-14.18.1-1.1.s390x", }, }, { category: "product_version", name: "npm14-14.18.1-1.1.s390x", product: { name: "npm14-14.18.1-1.1.s390x", product_id: "npm14-14.18.1-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-1.1.x86_64", product: { name: "nodejs14-14.18.1-1.1.x86_64", product_id: "nodejs14-14.18.1-1.1.x86_64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-1.1.x86_64", product: { name: "nodejs14-devel-14.18.1-1.1.x86_64", product_id: "nodejs14-devel-14.18.1-1.1.x86_64", }, }, { category: "product_version", name: "nodejs14-docs-14.18.1-1.1.x86_64", product: { name: "nodejs14-docs-14.18.1-1.1.x86_64", product_id: "nodejs14-docs-14.18.1-1.1.x86_64", }, }, { category: "product_version", name: "npm14-14.18.1-1.1.x86_64", product: { name: "npm14-14.18.1-1.1.x86_64", product_id: "npm14-14.18.1-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", }, product_reference: "nodejs14-14.18.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", }, product_reference: "nodejs14-14.18.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", }, product_reference: "nodejs14-14.18.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", }, product_reference: "nodejs14-14.18.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", }, product_reference: "nodejs14-devel-14.18.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", }, product_reference: "nodejs14-devel-14.18.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", }, product_reference: "nodejs14-devel-14.18.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", }, product_reference: "nodejs14-devel-14.18.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", }, product_reference: "nodejs14-docs-14.18.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", }, product_reference: "nodejs14-docs-14.18.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", }, product_reference: "nodejs14-docs-14.18.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", }, product_reference: "nodejs14-docs-14.18.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", }, product_reference: "npm14-14.18.1-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", }, product_reference: "npm14-14.18.1-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", }, product_reference: "npm14-14.18.1-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", }, product_reference: "npm14-14.18.1-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-devel-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.s390x", "openSUSE Tumbleweed:nodejs14-docs-14.18.1-1.1.x86_64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.aarch64", "openSUSE Tumbleweed:npm14-14.18.1-1.1.ppc64le", "openSUSE Tumbleweed:npm14-14.18.1-1.1.s390x", "openSUSE Tumbleweed:npm14-14.18.1-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
opensuse-su-2024:11637-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
corepack16-16.13.0-1.1 on GA media
Notes
Title of the patch
corepack16-16.13.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the corepack16-16.13.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11637
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "corepack16-16.13.0-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the corepack16-16.13.0-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11637", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11637-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, ], title: "corepack16-16.13.0-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11637-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "corepack16-16.13.0-1.1.aarch64", product: { name: "corepack16-16.13.0-1.1.aarch64", product_id: "corepack16-16.13.0-1.1.aarch64", }, }, { category: "product_version", name: "nodejs16-16.13.0-1.1.aarch64", product: { name: "nodejs16-16.13.0-1.1.aarch64", product_id: "nodejs16-16.13.0-1.1.aarch64", }, }, { category: "product_version", name: "nodejs16-devel-16.13.0-1.1.aarch64", product: { name: "nodejs16-devel-16.13.0-1.1.aarch64", product_id: "nodejs16-devel-16.13.0-1.1.aarch64", }, }, { category: "product_version", name: "nodejs16-docs-16.13.0-1.1.aarch64", product: { name: "nodejs16-docs-16.13.0-1.1.aarch64", product_id: "nodejs16-docs-16.13.0-1.1.aarch64", }, }, { category: "product_version", name: "npm16-16.13.0-1.1.aarch64", product: { name: "npm16-16.13.0-1.1.aarch64", product_id: "npm16-16.13.0-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "corepack16-16.13.0-1.1.ppc64le", product: { name: "corepack16-16.13.0-1.1.ppc64le", product_id: "corepack16-16.13.0-1.1.ppc64le", }, }, { category: "product_version", name: "nodejs16-16.13.0-1.1.ppc64le", product: { name: "nodejs16-16.13.0-1.1.ppc64le", product_id: "nodejs16-16.13.0-1.1.ppc64le", }, }, { category: "product_version", name: "nodejs16-devel-16.13.0-1.1.ppc64le", product: { name: "nodejs16-devel-16.13.0-1.1.ppc64le", product_id: "nodejs16-devel-16.13.0-1.1.ppc64le", }, }, { category: "product_version", name: "nodejs16-docs-16.13.0-1.1.ppc64le", product: { name: "nodejs16-docs-16.13.0-1.1.ppc64le", product_id: "nodejs16-docs-16.13.0-1.1.ppc64le", }, }, { category: "product_version", name: "npm16-16.13.0-1.1.ppc64le", product: { name: "npm16-16.13.0-1.1.ppc64le", product_id: "npm16-16.13.0-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "corepack16-16.13.0-1.1.s390x", product: { name: "corepack16-16.13.0-1.1.s390x", product_id: "corepack16-16.13.0-1.1.s390x", }, }, { category: "product_version", name: "nodejs16-16.13.0-1.1.s390x", product: { name: "nodejs16-16.13.0-1.1.s390x", product_id: "nodejs16-16.13.0-1.1.s390x", }, }, { category: "product_version", name: "nodejs16-devel-16.13.0-1.1.s390x", product: { name: "nodejs16-devel-16.13.0-1.1.s390x", product_id: "nodejs16-devel-16.13.0-1.1.s390x", }, }, { category: "product_version", name: "nodejs16-docs-16.13.0-1.1.s390x", product: { name: "nodejs16-docs-16.13.0-1.1.s390x", product_id: "nodejs16-docs-16.13.0-1.1.s390x", }, }, { category: "product_version", name: "npm16-16.13.0-1.1.s390x", product: { name: "npm16-16.13.0-1.1.s390x", product_id: "npm16-16.13.0-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "corepack16-16.13.0-1.1.x86_64", product: { name: "corepack16-16.13.0-1.1.x86_64", product_id: "corepack16-16.13.0-1.1.x86_64", }, }, { category: "product_version", name: "nodejs16-16.13.0-1.1.x86_64", product: { name: "nodejs16-16.13.0-1.1.x86_64", product_id: "nodejs16-16.13.0-1.1.x86_64", }, }, { category: "product_version", name: "nodejs16-devel-16.13.0-1.1.x86_64", product: { name: "nodejs16-devel-16.13.0-1.1.x86_64", product_id: "nodejs16-devel-16.13.0-1.1.x86_64", }, }, { category: "product_version", name: "nodejs16-docs-16.13.0-1.1.x86_64", product: { name: "nodejs16-docs-16.13.0-1.1.x86_64", product_id: "nodejs16-docs-16.13.0-1.1.x86_64", }, }, { category: "product_version", name: "npm16-16.13.0-1.1.x86_64", product: { name: "npm16-16.13.0-1.1.x86_64", product_id: "npm16-16.13.0-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "corepack16-16.13.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", }, product_reference: "corepack16-16.13.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "corepack16-16.13.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", }, product_reference: "corepack16-16.13.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "corepack16-16.13.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", }, product_reference: "corepack16-16.13.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "corepack16-16.13.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", }, product_reference: "corepack16-16.13.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-16.13.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", }, product_reference: "nodejs16-16.13.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-16.13.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", }, product_reference: "nodejs16-16.13.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-16.13.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", }, product_reference: "nodejs16-16.13.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-16.13.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", }, product_reference: "nodejs16-16.13.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-devel-16.13.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", }, product_reference: "nodejs16-devel-16.13.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-devel-16.13.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", }, product_reference: "nodejs16-devel-16.13.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-devel-16.13.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", }, product_reference: "nodejs16-devel-16.13.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-devel-16.13.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", }, product_reference: "nodejs16-devel-16.13.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-docs-16.13.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", }, product_reference: "nodejs16-docs-16.13.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-docs-16.13.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", }, product_reference: "nodejs16-docs-16.13.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-docs-16.13.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", }, product_reference: "nodejs16-docs-16.13.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nodejs16-docs-16.13.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", }, product_reference: "nodejs16-docs-16.13.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm16-16.13.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", }, product_reference: "npm16-16.13.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm16-16.13.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", }, product_reference: "npm16-16.13.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm16-16.13.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", }, product_reference: "npm16-16.13.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "npm16-16.13.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", }, product_reference: "npm16-16.13.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:corepack16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:corepack16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-devel-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.s390x", "openSUSE Tumbleweed:nodejs16-docs-16.13.0-1.1.x86_64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.aarch64", "openSUSE Tumbleweed:npm16-16.13.0-1.1.ppc64le", "openSUSE Tumbleweed:npm16-16.13.0-1.1.s390x", "openSUSE Tumbleweed:npm16-16.13.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-22960", }, ], }
opensuse-su-2021:1552-1
Vulnerability from csaf_opensuse
Published
2021-12-10 09:43
Modified
2021-12-10 09:43
Summary
Security update for nodejs14
Notes
Title of the patch
Security update for nodejs14
Description of the patch
This update for nodejs14 fixes the following issues:
nodejs14 was updated to 14.18.1:
* deps: update llhttp to 2.1.4
- HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)
- HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)
Changes in 14.18.0:
* buffer:
+ introduce Blob
+ add base64url encoding option
* child_process:
+ allow options.cwd receive a URL
+ add timeout to spawn and fork
+ allow promisified exec to be cancel
+ add 'overlapped' stdio flag
* dns: add 'tries' option to Resolve options
* fs:
+ allow empty string for temp directory prefix
+ allow no-params fsPromises fileHandle read
+ add support for async iterators to fsPromises.writeFile
* http2: add support for sensitive headers
* process: add 'worker' event
* tls: allow reading data into a static buffer
* worker: add setEnvironmentData/getEnvironmentData
Changes in 14.17.6
* deps: upgrade npm to 6.14.15 which fixes a number of
security issues
(bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,
bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,
bsc#1190053, CVE-2021-39135)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-1552
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs14", title: "Title of the patch", }, { category: "description", text: "This update for nodejs14 fixes the following issues:\n\nnodejs14 was updated to 14.18.1:\n\n* deps: update llhttp to 2.1.4\n\n - HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)\n - HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)\n\nChanges in 14.18.0:\n\n * buffer:\n\n + introduce Blob\n + add base64url encoding option\n\n * child_process:\n\n + allow options.cwd receive a URL\n + add timeout to spawn and fork\n + allow promisified exec to be cancel\n + add 'overlapped' stdio flag\n\n * dns: add 'tries' option to Resolve options\n * fs:\n\n + allow empty string for temp directory prefix\n + allow no-params fsPromises fileHandle read\n + add support for async iterators to fsPromises.writeFile\n\n * http2: add support for sensitive headers\n * process: add 'worker' event\n * tls: allow reading data into a static buffer\n * worker: add setEnvironmentData/getEnvironmentData\n\nChanges in 14.17.6\n\n * deps: upgrade npm to 6.14.15 which fixes a number of\n security issues\n (bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,\n bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,\n bsc#1190053, CVE-2021-39135)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1552", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1552-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1552-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1552-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INKZHV64GX7LRVL3YYOERQLU3B3U47QD/", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs14", tracking: { current_release_date: "2021-12-10T09:43:16Z", generator: { date: "2021-12-10T09:43:16Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1552-1", initial_release_date: "2021-12-10T09:43:16Z", revision_history: [ { date: "2021-12-10T09:43:16Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs14-docs-14.18.1-lp152.17.1.noarch", product: { name: "nodejs14-docs-14.18.1-lp152.17.1.noarch", product_id: "nodejs14-docs-14.18.1-lp152.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-lp152.17.1.x86_64", product: { name: "nodejs14-14.18.1-lp152.17.1.x86_64", product_id: "nodejs14-14.18.1-lp152.17.1.x86_64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-lp152.17.1.x86_64", product: { name: "nodejs14-devel-14.18.1-lp152.17.1.x86_64", product_id: "nodejs14-devel-14.18.1-lp152.17.1.x86_64", }, }, { category: "product_version", name: "npm14-14.18.1-lp152.17.1.x86_64", product: { name: "npm14-14.18.1-lp152.17.1.x86_64", product_id: "npm14-14.18.1-lp152.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-lp152.17.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", }, product_reference: "nodejs14-14.18.1-lp152.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-lp152.17.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", }, product_reference: "nodejs14-devel-14.18.1-lp152.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-lp152.17.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", }, product_reference: "nodejs14-docs-14.18.1-lp152.17.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-lp152.17.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", }, product_reference: "npm14-14.18.1-lp152.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs14-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-devel-14.18.1-lp152.17.1.x86_64", "openSUSE Leap 15.2:nodejs14-docs-14.18.1-lp152.17.1.noarch", "openSUSE Leap 15.2:npm14-14.18.1-lp152.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-10T09:43:16Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
opensuse-su-2021:1574-1
Vulnerability from csaf_opensuse
Published
2021-12-12 01:19
Modified
2021-12-12 01:19
Summary
Security update for nodejs12
Notes
Title of the patch
Security update for nodejs12
Description of the patch
This update for nodejs12 fixes the following issues:
- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057).
- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056).
- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055).
- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054).
- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053).
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-1574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs12", title: "Title of the patch", }, { category: "description", text: "This update for nodejs12 fixes the following issues:\n\n- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).\n- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).\n- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057). \n- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056). \n- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055). \n- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054). \n- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053). \n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1574", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1574-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1574-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1574-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZ6MU5ASKOGKZBGVKFFXVB64PMZRVEPX/", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs12", tracking: { current_release_date: "2021-12-12T01:19:11Z", generator: { date: "2021-12-12T01:19:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1574-1", initial_release_date: "2021-12-12T01:19:11Z", revision_history: [ { date: "2021-12-12T01:19:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs12-12.22.7-lp152.3.21.1.i586", product: { name: "nodejs12-12.22.7-lp152.3.21.1.i586", product_id: "nodejs12-12.22.7-lp152.3.21.1.i586", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-lp152.3.21.1.i586", product: { name: "nodejs12-devel-12.22.7-lp152.3.21.1.i586", product_id: "nodejs12-devel-12.22.7-lp152.3.21.1.i586", }, }, { category: "product_version", name: "npm12-12.22.7-lp152.3.21.1.i586", product: { name: "npm12-12.22.7-lp152.3.21.1.i586", product_id: "npm12-12.22.7-lp152.3.21.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "nodejs12-docs-12.22.7-lp152.3.21.1.noarch", product: { name: "nodejs12-docs-12.22.7-lp152.3.21.1.noarch", product_id: "nodejs12-docs-12.22.7-lp152.3.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-lp152.3.21.1.x86_64", product: { name: "nodejs12-12.22.7-lp152.3.21.1.x86_64", product_id: "nodejs12-12.22.7-lp152.3.21.1.x86_64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", product: { name: "nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", product_id: "nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", }, }, { category: "product_version", name: "npm12-12.22.7-lp152.3.21.1.x86_64", product: { name: "npm12-12.22.7-lp152.3.21.1.x86_64", product_id: "npm12-12.22.7-lp152.3.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-lp152.3.21.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", }, product_reference: "nodejs12-12.22.7-lp152.3.21.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-lp152.3.21.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", }, product_reference: "nodejs12-12.22.7-lp152.3.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-lp152.3.21.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", }, product_reference: "nodejs12-devel-12.22.7-lp152.3.21.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-lp152.3.21.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", }, product_reference: "nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-docs-12.22.7-lp152.3.21.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", }, product_reference: "nodejs12-docs-12.22.7-lp152.3.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-lp152.3.21.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", }, product_reference: "npm12-12.22.7-lp152.3.21.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-lp152.3.21.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", }, product_reference: "npm12-12.22.7-lp152.3.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:nodejs12-devel-12.22.7-lp152.3.21.1.x86_64", "openSUSE Leap 15.2:nodejs12-docs-12.22.7-lp152.3.21.1.noarch", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.i586", "openSUSE Leap 15.2:npm12-12.22.7-lp152.3.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-12T01:19:11Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
RHSA-2022:4914
Vulnerability from csaf_redhat
Published
2022-06-06 09:29
Modified
2025-03-21 01:01
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.12). This is the last planned rebase before the collection reaches End of Life.
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.12). This is the last planned rebase before the collection reaches End of Life.\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)\n\n* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)\n\n* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)\n\n* minimist: prototype pollution (CVE-2021-44906)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\n* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:4914", url: "https://access.redhat.com/errata/RHSA-2022:4914", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "2066009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066009", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4914.json", }, ], title: "Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:00+00:00", generator: { date: "2025-03-21T01:01:00+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:4914", initial_release_date: "2022-06-06T09:29:16+00:00", revision_history: [ { date: "2022-06-06T09:29:16+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-06T09:29:16+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:00+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product_id: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.22.12-2.el7?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", }, product_reference: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", }, product_reference: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2021-44906", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, discovery_date: "2022-03-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2066009", }, ], notes: [ { category: "description", text: "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", title: "Vulnerability description", }, { category: "summary", text: "minimist: prototype pollution", title: "Vulnerability summary", }, { category: "other", text: "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44906", }, { category: "external", summary: "RHBZ#2066009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066009", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44906", url: "https://www.cve.org/CVERecord?id=CVE-2021-44906", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", }, { category: "external", summary: "https://github.com/advisories/GHSA-xvch-5gv4-984h", url: "https://github.com/advisories/GHSA-xvch-5gv4-984h", }, ], release_date: "2022-03-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "minimist: prototype pollution", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
RHSA-2021:5171
Vulnerability from csaf_redhat
Published
2021-12-16 17:21
Modified
2025-03-20 17:21
Summary
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:5171", url: "https://access.redhat.com/errata/RHSA-2021:5171", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5171.json", }, ], title: "Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-20T17:21:18+00:00", generator: { date: "2025-03-20T17:21:18+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2021:5171", initial_release_date: "2021-12-16T17:21:31+00:00", revision_history: [ { date: "2021-12-16T17:21:31+00:00", number: "1", summary: "Initial version", }, { date: "2021-12-16T17:21:31+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-20T17:21:18+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:16:8050020211206113934:c5368500", product: { name: "nodejs:16:8050020211206113934:c5368500", product_id: "nodejs:16:8050020211206113934:c5368500", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@16:8050020211206113934:c5368500", }, }, }, { category: "product_version", name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product: { name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product_id: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13548%2B45d748af?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product_id: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@25-1.module%2Bel8.5.0%2B10992%2Bfac5fe06?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13548%2B45d748af?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product_id: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@25-1.module%2Bel8.5.0%2B10992%2Bfac5fe06?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, product_reference: "nodejs:16:8050020211206113934:c5368500", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", }, product_reference: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", }, product_reference: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", }, product_reference: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", ], known_not_affected: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, ], }
rhea-2022_5615
Vulnerability from csaf_redhat
Published
2022-07-19 21:07
Modified
2024-12-17 22:55
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084652)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084652)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5615", url: "https://access.redhat.com/errata/RHEA-2022:5615", }, { category: "external", summary: "2084652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084652", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5615.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2024-12-17T22:55:03+00:00", generator: { date: "2024-12-17T22:55:03+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHEA-2022:5615", initial_release_date: "2022-07-19T21:07:21+00:00", revision_history: [ { date: "2022-07-19T21:07:21+00:00", number: "1", summary: "Initial version", }, { date: "2022-07-19T21:07:21+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:55:03+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.4::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8040020220523155137:522a0ee4", product: { name: "nodejs:12:8040020220523155137:522a0ee4", product_id: "nodejs:12:8040020220523155137:522a0ee4", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8040020220523155137:522a0ee4", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, product_reference: "nodejs:12:8040020220523155137:522a0ee4", relates_to_product_reference: "AppStream-8.4.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhea-2022_5139
Vulnerability from csaf_redhat
Published
2022-06-21 12:40
Modified
2024-12-17 22:55
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Details
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5139", url: "https://access.redhat.com/errata/RHEA-2022:5139", }, { category: "external", summary: "2084651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084651", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5139.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2024-12-17T22:55:22+00:00", generator: { date: "2024-12-17T22:55:22+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHEA-2022:5139", initial_release_date: "2022-06-21T12:40:06+00:00", revision_history: [ { date: "2022-06-21T12:40:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-21T12:40:06+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:55:22+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8060020220523160029:ad008a3a", product: { name: "nodejs:12:8060020220523160029:ad008a3a", product_id: "nodejs:12:8060020220523160029:ad008a3a", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8060020220523160029:ad008a3a", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, product_reference: "nodejs:12:8060020220523160029:ad008a3a", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhea-2022_5221
Vulnerability from csaf_redhat
Published
2022-06-28 07:58
Modified
2024-12-17 22:55
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084653)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084653)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5221", url: "https://access.redhat.com/errata/RHEA-2022:5221", }, { category: "external", summary: "2084653", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084653", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5221.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2024-12-17T22:55:12+00:00", generator: { date: "2024-12-17T22:55:12+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHEA-2022:5221", initial_release_date: "2022-06-28T07:58:19+00:00", revision_history: [ { date: "2022-06-28T07:58:19+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-28T07:58:19+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:55:12+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.2::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8020020220523154454:4cda2c84", product: { name: "nodejs:12:8020020220523154454:4cda2c84", product_id: "nodejs:12:8020020220523154454:4cda2c84", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8020020220523154454:4cda2c84", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, product_reference: "nodejs:12:8020020220523154454:4cda2c84", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
RHEA-2022:4925
Vulnerability from csaf_redhat
Published
2022-06-07 08:24
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Details
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084654)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084654)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:4925", url: "https://access.redhat.com/errata/RHEA-2022:4925", }, { category: "external", summary: "2084654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084654", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_4925.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:09+00:00", generator: { date: "2025-03-21T01:01:09+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:4925", initial_release_date: "2022-06-07T08:24:22+00:00", revision_history: [ { date: "2022-06-07T08:24:22+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-07T08:24:22+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:09+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product: { name: "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_e4s:8.1::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8010020220518102644:c27ad7f8", product: { name: "nodejs:12:8010020220518102644:c27ad7f8", product_id: "nodejs:12:8010020220518102644:c27ad7f8", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8010020220518102644:c27ad7f8", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, product_reference: "nodejs:12:8010020220518102644:c27ad7f8", relates_to_product_reference: "AppStream-8.1.0.Z.E4S", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhea-2022:5615
Vulnerability from csaf_redhat
Published
2022-07-19 21:07
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084652)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084652)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5615", url: "https://access.redhat.com/errata/RHEA-2022:5615", }, { category: "external", summary: "2084652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084652", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5615.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:18+00:00", generator: { date: "2025-03-21T01:01:18+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:5615", initial_release_date: "2022-07-19T21:07:21+00:00", revision_history: [ { date: "2022-07-19T21:07:21+00:00", number: "1", summary: "Initial version", }, { date: "2022-07-19T21:07:21+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:18+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.4::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8040020220523155137:522a0ee4", product: { name: "nodejs:12:8040020220523155137:522a0ee4", product_id: "nodejs:12:8040020220523155137:522a0ee4", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8040020220523155137:522a0ee4", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, product_reference: "nodejs:12:8040020220523155137:522a0ee4", relates_to_product_reference: "AppStream-8.4.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
RHEA-2022:5615
Vulnerability from csaf_redhat
Published
2022-07-19 21:07
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084652)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084652)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5615", url: "https://access.redhat.com/errata/RHEA-2022:5615", }, { category: "external", summary: "2084652", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084652", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5615.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:18+00:00", generator: { date: "2025-03-21T01:01:18+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:5615", initial_release_date: "2022-07-19T21:07:21+00:00", revision_history: [ { date: "2022-07-19T21:07:21+00:00", number: "1", summary: "Initial version", }, { date: "2022-07-19T21:07:21+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:18+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.4::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8040020220523155137:522a0ee4", product: { name: "nodejs:12:8040020220523155137:522a0ee4", product_id: "nodejs:12:8040020220523155137:522a0ee4", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8040020220523155137:522a0ee4", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.4.0%2B15323%2B4d1cc445?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, product_reference: "nodejs:12:8040020220523155137:522a0ee4", relates_to_product_reference: "AppStream-8.4.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64 as a component of nodejs:12:8040020220523155137:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-07-19T21:07:21+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5615", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debuginfo-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-debugsource-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-devel-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-docs-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-full-i18n-1:12.22.12-1.module+el8.4.0+15323+4d1cc445.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.s390x", "AppStream-8.4.0.Z.EUS:nodejs:12:8040020220523155137:522a0ee4:npm-1:6.14.16-1.12.22.12.1.module+el8.4.0+15323+4d1cc445.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhsa-2022_0041
Vulnerability from csaf_redhat
Published
2022-01-06 18:43
Modified
2024-12-17 22:54
Summary
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
Notes
Topic
An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2). (BZ#2031766)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2). (BZ#2031766)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0041", url: "https://access.redhat.com/errata/RHSA-2022:0041", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "2031766", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2031766", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0041.json", }, ], title: "Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update", tracking: { current_release_date: "2024-12-17T22:54:11+00:00", generator: { date: "2024-12-17T22:54:11+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2022:0041", initial_release_date: "2022-01-06T18:43:03+00:00", revision_history: [ { date: "2022-01-06T18:43:03+00:00", number: "1", summary: "Initial version", }, { date: "2022-01-06T18:43:03+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:54:11+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=src", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product_id: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product_id: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.18.2-1.el7?arch=noarch", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product_id: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6.el7?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
rhsa-2022_0350
Vulnerability from csaf_redhat
Published
2022-02-01 21:18
Modified
2024-12-17 22:54
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0350", url: "https://access.redhat.com/errata/RHSA-2022:0350", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0350.json", }, ], title: "Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update", tracking: { current_release_date: "2024-12-17T22:54:28+00:00", generator: { date: "2024-12-17T22:54:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2022:0350", initial_release_date: "2022-02-01T21:18:22+00:00", revision_history: [ { date: "2022-02-01T21:18:22+00:00", number: "1", summary: "Initial version", }, { date: "2022-02-01T21:18:22+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:54:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:14:8050020211213115342:c5368500", product: { name: "nodejs:14:8050020211213115342:c5368500", product_id: "nodejs:14:8050020211213115342:c5368500", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@14:8050020211213115342:c5368500", }, }, }, { category: "product_version", name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product: { name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product_id: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13504%2Ba2e74d91?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13504%2Ba2e74d91?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, product_reference: "nodejs:14:8050020211213115342:c5368500", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", }, product_reference: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
RHEA-2022:5221
Vulnerability from csaf_redhat
Published
2022-06-28 07:58
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084653)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084653)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5221", url: "https://access.redhat.com/errata/RHEA-2022:5221", }, { category: "external", summary: "2084653", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084653", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5221.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:28+00:00", generator: { date: "2025-03-21T01:01:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:5221", initial_release_date: "2022-06-28T07:58:19+00:00", revision_history: [ { date: "2022-06-28T07:58:19+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-28T07:58:19+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.2::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8020020220523154454:4cda2c84", product: { name: "nodejs:12:8020020220523154454:4cda2c84", product_id: "nodejs:12:8020020220523154454:4cda2c84", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8020020220523154454:4cda2c84", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, product_reference: "nodejs:12:8020020220523154454:4cda2c84", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhsa-2022:0350
Vulnerability from csaf_redhat
Published
2022-02-01 21:18
Modified
2025-03-21 01:00
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0350", url: "https://access.redhat.com/errata/RHSA-2022:0350", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0350.json", }, ], title: "Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-21T01:00:39+00:00", generator: { date: "2025-03-21T01:00:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:0350", initial_release_date: "2022-02-01T21:18:22+00:00", revision_history: [ { date: "2022-02-01T21:18:22+00:00", number: "1", summary: "Initial version", }, { date: "2022-02-01T21:18:22+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:00:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:14:8050020211213115342:c5368500", product: { name: "nodejs:14:8050020211213115342:c5368500", product_id: "nodejs:14:8050020211213115342:c5368500", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@14:8050020211213115342:c5368500", }, }, }, { category: "product_version", name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product: { name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product_id: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13504%2Ba2e74d91?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13504%2Ba2e74d91?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, product_reference: "nodejs:14:8050020211213115342:c5368500", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", }, product_reference: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
RHSA-2022:0041
Vulnerability from csaf_redhat
Published
2022-01-06 18:43
Modified
2025-03-21 01:00
Summary
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
Notes
Topic
An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2). (BZ#2031766)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2). (BZ#2031766)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0041", url: "https://access.redhat.com/errata/RHSA-2022:0041", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "2031766", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2031766", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0041.json", }, ], title: "Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update", tracking: { current_release_date: "2025-03-21T01:00:20+00:00", generator: { date: "2025-03-21T01:00:20+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:0041", initial_release_date: "2022-01-06T18:43:03+00:00", revision_history: [ { date: "2022-01-06T18:43:03+00:00", number: "1", summary: "Initial version", }, { date: "2022-01-06T18:43:03+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:00:20+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=src", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product_id: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product_id: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.18.2-1.el7?arch=noarch", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product_id: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6.el7?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
rhea-2022:4925
Vulnerability from csaf_redhat
Published
2022-06-07 08:24
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Details
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084654)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084654)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:4925", url: "https://access.redhat.com/errata/RHEA-2022:4925", }, { category: "external", summary: "2084654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084654", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_4925.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:09+00:00", generator: { date: "2025-03-21T01:01:09+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:4925", initial_release_date: "2022-06-07T08:24:22+00:00", revision_history: [ { date: "2022-06-07T08:24:22+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-07T08:24:22+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:09+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product: { name: "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_e4s:8.1::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8010020220518102644:c27ad7f8", product: { name: "nodejs:12:8010020220518102644:c27ad7f8", product_id: "nodejs:12:8010020220518102644:c27ad7f8", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8010020220518102644:c27ad7f8", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, product_reference: "nodejs:12:8010020220518102644:c27ad7f8", relates_to_product_reference: "AppStream-8.1.0.Z.E4S", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
RHSA-2022:0350
Vulnerability from csaf_redhat
Published
2022-02-01 21:18
Modified
2025-03-21 01:00
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0350", url: "https://access.redhat.com/errata/RHSA-2022:0350", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0350.json", }, ], title: "Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-21T01:00:39+00:00", generator: { date: "2025-03-21T01:00:39+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:0350", initial_release_date: "2022-02-01T21:18:22+00:00", revision_history: [ { date: "2022-02-01T21:18:22+00:00", number: "1", summary: "Initial version", }, { date: "2022-02-01T21:18:22+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:00:39+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:14:8050020211213115342:c5368500", product: { name: "nodejs:14:8050020211213115342:c5368500", product_id: "nodejs:14:8050020211213115342:c5368500", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@14:8050020211213115342:c5368500", }, }, }, { category: "product_version", name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product: { name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product_id: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13504%2Ba2e74d91?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13504%2Ba2e74d91?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.5.0%2B13644%2B8d46dafd?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, product_reference: "nodejs:14:8050020211213115342:c5368500", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", }, product_reference: "nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64 as a component of nodejs:14:8050020211213115342:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-02-01T21:18:22+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0350", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debuginfo-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-debugsource-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-devel-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13504+a2e74d91.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:14:8050020211213115342:c5368500:npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
rhsa-2022:0246
Vulnerability from csaf_redhat
Published
2022-01-25 09:28
Modified
2025-03-21 01:00
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027608)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027608)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0246", url: "https://access.redhat.com/errata/RHSA-2022:0246", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0246.json", }, ], title: "Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-21T01:00:31+00:00", generator: { date: "2025-03-21T01:00:31+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:0246", initial_release_date: "2022-01-25T09:28:51+00:00", revision_history: [ { date: "2022-01-25T09:28:51+00:00", number: "1", summary: "Initial version", }, { date: "2022-01-25T09:28:51+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:00:31+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.4::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:14:8040020211213111158:522a0ee4", product: { name: "nodejs:14:8040020211213111158:522a0ee4", product_id: "nodejs:14:8040020211213111158:522a0ee4", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@14:8040020211213111158:522a0ee4", }, }, }, { category: "product_version", name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product: { name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product_id: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.4.0%2B13503%2Bfc29810b?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.4.0%2B13503%2Bfc29810b?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, product_reference: "nodejs:14:8040020211213111158:522a0ee4", relates_to_product_reference: "AppStream-8.4.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", }, product_reference: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
rhea-2022_4925
Vulnerability from csaf_redhat
Published
2022-06-07 08:24
Modified
2024-12-17 22:54
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Details
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084654)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084654)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:4925", url: "https://access.redhat.com/errata/RHEA-2022:4925", }, { category: "external", summary: "2084654", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084654", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_4925.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2024-12-17T22:54:54+00:00", generator: { date: "2024-12-17T22:54:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHEA-2022:4925", initial_release_date: "2022-06-07T08:24:22+00:00", revision_history: [ { date: "2022-06-07T08:24:22+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-07T08:24:22+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:54:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product: { name: "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_e4s:8.1::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8010020220518102644:c27ad7f8", product: { name: "nodejs:12:8010020220518102644:c27ad7f8", product_id: "nodejs:12:8010020220518102644:c27ad7f8", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8010020220518102644:c27ad7f8", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.1.0%2B15296%2B87b2f6ad?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, product_reference: "nodejs:12:8010020220518102644:c27ad7f8", relates_to_product_reference: "AppStream-8.1.0.Z.E4S", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64 as a component of nodejs:12:8010020220518102644:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", product_id: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", relates_to_product_reference: "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-07T08:24:22+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:4925", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debuginfo-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-debugsource-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-devel-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-docs-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-full-i18n-1:12.22.12-1.module+el8.1.0+15296+87b2f6ad.x86_64", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.ppc64le", "AppStream-8.1.0.Z.E4S:nodejs:12:8010020220518102644:c27ad7f8:npm-1:6.14.16-1.12.22.12.1.module+el8.1.0+15296+87b2f6ad.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhsa-2021:5171
Vulnerability from csaf_redhat
Published
2021-12-16 17:21
Modified
2025-03-20 17:21
Summary
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:5171", url: "https://access.redhat.com/errata/RHSA-2021:5171", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5171.json", }, ], title: "Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-20T17:21:18+00:00", generator: { date: "2025-03-20T17:21:18+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2021:5171", initial_release_date: "2021-12-16T17:21:31+00:00", revision_history: [ { date: "2021-12-16T17:21:31+00:00", number: "1", summary: "Initial version", }, { date: "2021-12-16T17:21:31+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-20T17:21:18+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:16:8050020211206113934:c5368500", product: { name: "nodejs:16:8050020211206113934:c5368500", product_id: "nodejs:16:8050020211206113934:c5368500", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@16:8050020211206113934:c5368500", }, }, }, { category: "product_version", name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product: { name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product_id: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13548%2B45d748af?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product_id: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@25-1.module%2Bel8.5.0%2B10992%2Bfac5fe06?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13548%2B45d748af?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product_id: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@25-1.module%2Bel8.5.0%2B10992%2Bfac5fe06?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, product_reference: "nodejs:16:8050020211206113934:c5368500", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", }, product_reference: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", }, product_reference: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", }, product_reference: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", ], known_not_affected: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, ], }
rhsa-2021_5171
Vulnerability from csaf_redhat
Published
2021-12-16 17:21
Modified
2024-12-17 22:54
Summary
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:5171", url: "https://access.redhat.com/errata/RHSA-2021:5171", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5171.json", }, ], title: "Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update", tracking: { current_release_date: "2024-12-17T22:54:04+00:00", generator: { date: "2024-12-17T22:54:04+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2021:5171", initial_release_date: "2021-12-16T17:21:31+00:00", revision_history: [ { date: "2021-12-16T17:21:31+00:00", number: "1", summary: "Initial version", }, { date: "2021-12-16T17:21:31+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:54:04+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:16:8050020211206113934:c5368500", product: { name: "nodejs:16:8050020211206113934:c5368500", product_id: "nodejs:16:8050020211206113934:c5368500", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@16:8050020211206113934:c5368500", }, }, }, { category: "product_version", name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product: { name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product_id: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13548%2B45d748af?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product_id: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@25-1.module%2Bel8.5.0%2B10992%2Bfac5fe06?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.5.0%2B13548%2B45d748af?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product_id: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@25-1.module%2Bel8.5.0%2B10992%2Bfac5fe06?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@16.13.1-3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product_id: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@8.1.2-1.16.13.1.3.module%2Bel8.5.0%2B13548%2B45d748af?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, product_reference: "nodejs:16:8050020211206113934:c5368500", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", }, product_reference: "nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", }, product_reference: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", }, product_reference: "nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, { category: "default_component_of", full_product_name: { name: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64 as a component of nodejs:16:8050020211206113934:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", }, product_reference: "npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", flags: [ { label: "vulnerable_code_not_present", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", ], known_not_affected: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-12-16T17:21:31+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2021:5171", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debuginfo-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-debugsource-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-devel-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-docs-1:16.13.1-3.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-full-i18n-1:16.13.1-3.module+el8.5.0+13548+45d748af.x86_64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-nodemon-0:2.0.15-1.module+el8.5.0+13548+45d748af.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.noarch", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:nodejs-packaging-0:25-1.module+el8.5.0+10992+fac5fe06.src", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.aarch64", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.ppc64le", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.s390x", "AppStream-8.5.0.Z.MAIN:nodejs:16:8050020211206113934:c5368500:npm-1:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, ], }
rhea-2022:5139
Vulnerability from csaf_redhat
Published
2022-06-21 12:40
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Details
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5139", url: "https://access.redhat.com/errata/RHEA-2022:5139", }, { category: "external", summary: "2084651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084651", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5139.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:38+00:00", generator: { date: "2025-03-21T01:01:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:5139", initial_release_date: "2022-06-21T12:40:06+00:00", revision_history: [ { date: "2022-06-21T12:40:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-21T12:40:06+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8060020220523160029:ad008a3a", product: { name: "nodejs:12:8060020220523160029:ad008a3a", product_id: "nodejs:12:8060020220523160029:ad008a3a", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8060020220523160029:ad008a3a", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, product_reference: "nodejs:12:8060020220523160029:ad008a3a", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhsa-2022_0246
Vulnerability from csaf_redhat
Published
2022-01-25 09:28
Modified
2024-12-17 22:54
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027608)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027608)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0246", url: "https://access.redhat.com/errata/RHSA-2022:0246", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0246.json", }, ], title: "Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update", tracking: { current_release_date: "2024-12-17T22:54:19+00:00", generator: { date: "2024-12-17T22:54:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2022:0246", initial_release_date: "2022-01-25T09:28:51+00:00", revision_history: [ { date: "2022-01-25T09:28:51+00:00", number: "1", summary: "Initial version", }, { date: "2022-01-25T09:28:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:54:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.4::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:14:8040020211213111158:522a0ee4", product: { name: "nodejs:14:8040020211213111158:522a0ee4", product_id: "nodejs:14:8040020211213111158:522a0ee4", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@14:8040020211213111158:522a0ee4", }, }, }, { category: "product_version", name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product: { name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product_id: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.4.0%2B13503%2Bfc29810b?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.4.0%2B13503%2Bfc29810b?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, product_reference: "nodejs:14:8040020211213111158:522a0ee4", relates_to_product_reference: "AppStream-8.4.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", }, product_reference: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
RHEA-2022:5139
Vulnerability from csaf_redhat
Published
2022-06-21 12:40
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Details
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084651)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5139", url: "https://access.redhat.com/errata/RHEA-2022:5139", }, { category: "external", summary: "2084651", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084651", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5139.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:38+00:00", generator: { date: "2025-03-21T01:01:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:5139", initial_release_date: "2022-06-21T12:40:06+00:00", revision_history: [ { date: "2022-06-21T12:40:06+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-21T12:40:06+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8060020220523160029:ad008a3a", product: { name: "nodejs:12:8060020220523160029:ad008a3a", product_id: "nodejs:12:8060020220523160029:ad008a3a", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8060020220523160029:ad008a3a", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_id: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.6.0%2B15324%2B1f2c5d8d?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, product_reference: "nodejs:12:8060020220523160029:ad008a3a", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", }, product_reference: "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64 as a component of nodejs:12:8060020220523160029:ad008a3a as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", relates_to_product_reference: "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-21T12:40:06+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5139", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debuginfo-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-debugsource-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-devel-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-docs-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-full-i18n-1:12.22.12-1.module+el8.6.0+15324+1f2c5d8d.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.s390x", "AppStream-8.6.0.Z.MAIN.EUS:nodejs:12:8060020220523160029:ad008a3a:npm-1:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhea-2022:5221
Vulnerability from csaf_redhat
Published
2022-06-28 07:58
Modified
2025-03-21 01:01
Summary
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* nodejs:12/nodejs: rebase to last upstream release (BZ#2084653)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nBug Fix(es) and Enhancement(s):\n\n* nodejs:12/nodejs: rebase to last upstream release (BZ#2084653)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHEA-2022:5221", url: "https://access.redhat.com/errata/RHEA-2022:5221", }, { category: "external", summary: "2084653", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2084653", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhea-2022_5221.json", }, ], title: "Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:28+00:00", generator: { date: "2025-03-21T01:01:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHEA-2022:5221", initial_release_date: "2022-06-28T07:58:19+00:00", revision_history: [ { date: "2022-06-28T07:58:19+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-28T07:58:19+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.2::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:12:8020020220523154454:4cda2c84", product: { name: "nodejs:12:8020020220523154454:4cda2c84", product_id: "nodejs:12:8020020220523154454:4cda2c84", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@12:8020020220523154454:4cda2c84", }, }, }, { category: "product_version", name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product: { name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product_id: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_id: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@12.22.12-1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product_id: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.16-1.12.22.12.1.module%2Bel8.2.0%2B15322%2Ba70ca0ab?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, product_reference: "nodejs:12:8020020220523154454:4cda2c84", relates_to_product_reference: "AppStream-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", }, product_reference: "nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", }, product_reference: "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64 as a component of nodejs:12:8020020220523154454:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", product_id: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", }, product_reference: "npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", relates_to_product_reference: "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-28T07:58:19+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHEA-2022:5221", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debuginfo-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-debugsource-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-devel-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-docs-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-full-i18n-1:12.22.12-1.module+el8.2.0+15322+a70ca0ab.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020220523154454:4cda2c84:npm-1:6.14.16-1.12.22.12.1.module+el8.2.0+15322+a70ca0ab.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
rhsa-2022_4914
Vulnerability from csaf_redhat
Published
2022-06-06 09:29
Modified
2024-12-17 22:55
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.12). This is the last planned rebase before the collection reaches End of Life.
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.12). This is the last planned rebase before the collection reaches End of Life.\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)\n\n* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)\n\n* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)\n\n* minimist: prototype pollution (CVE-2021-44906)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\n* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:4914", url: "https://access.redhat.com/errata/RHSA-2022:4914", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "2066009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066009", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4914.json", }, ], title: "Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update", tracking: { current_release_date: "2024-12-17T22:55:06+00:00", generator: { date: "2024-12-17T22:55:06+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2022:4914", initial_release_date: "2022-06-06T09:29:16+00:00", revision_history: [ { date: "2022-06-06T09:29:16+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-06T09:29:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-17T22:55:06+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product_id: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.22.12-2.el7?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", }, product_reference: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", }, product_reference: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2021-44906", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, discovery_date: "2022-03-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2066009", }, ], notes: [ { category: "description", text: "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", title: "Vulnerability description", }, { category: "summary", text: "minimist: prototype pollution", title: "Vulnerability summary", }, { category: "other", text: "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44906", }, { category: "external", summary: "RHBZ#2066009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066009", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44906", url: "https://www.cve.org/CVERecord?id=CVE-2021-44906", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", }, { category: "external", summary: "https://github.com/advisories/GHSA-xvch-5gv4-984h", url: "https://github.com/advisories/GHSA-xvch-5gv4-984h", }, ], release_date: "2022-03-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "minimist: prototype pollution", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
RHSA-2022:0246
Vulnerability from csaf_redhat
Published
2022-01-25 09:28
Modified
2025-03-21 01:00
Summary
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027608)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027608)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0246", url: "https://access.redhat.com/errata/RHSA-2022:0246", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0246.json", }, ], title: "Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-21T01:00:31+00:00", generator: { date: "2025-03-21T01:00:31+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:0246", initial_release_date: "2022-01-25T09:28:51+00:00", revision_history: [ { date: "2022-01-25T09:28:51+00:00", number: "1", summary: "Initial version", }, { date: "2022-01-25T09:28:51+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:00:31+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product: { name: "Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_eus:8.4::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "nodejs:14:8040020211213111158:522a0ee4", product: { name: "nodejs:14:8040020211213111158:522a0ee4", product_id: "nodejs:14:8040020211213111158:522a0ee4", product_identification_helper: { purl: "pkg:rpmmod/redhat/nodejs@14:8040020211213111158:522a0ee4", }, }, }, { category: "product_version", name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product: { name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product_id: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-docs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=noarch&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.4.0%2B13503%2Bfc29810b?arch=noarch", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=src&epoch=1", }, }, }, { category: "product_version", name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product_id: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-nodemon@2.0.15-1.module%2Bel8.4.0%2B13503%2Bfc29810b?arch=src", }, }, }, { category: "product_version", name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_id: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debuginfo@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-debugsource@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-devel@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/nodejs-full-i18n@14.18.2-2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product_id: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/npm@6.14.15-1.14.18.2.2.module%2Bel8.4.0%2B13643%2B6c0ebf22?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, product_reference: "nodejs:14:8040020211213111158:522a0ee4", relates_to_product_reference: "AppStream-8.4.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", }, product_reference: "nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", }, product_reference: "nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", }, product_reference: "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, { category: "default_component_of", full_product_name: { name: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64 as a component of nodejs:14:8040020211213111158:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", product_id: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", }, product_reference: "npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", relates_to_product_reference: "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", }, ], }, vulnerabilities: [ { cve: "CVE-2020-7788", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2020-12-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1907444", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ini: Prototype pollution via malicious INI file", title: "Vulnerability summary", }, { category: "other", text: "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-7788", }, { category: "external", summary: "RHBZ#1907444", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1907444", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-7788", url: "https://www.cve.org/CVERecord?id=CVE-2020-7788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", }, ], release_date: "2020-12-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ini: Prototype pollution via malicious INI file", }, { cve: "CVE-2020-28469", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-04-01T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1945459", }, ], notes: [ { category: "description", text: "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-glob-parent: Regular expression denial of service", title: "Vulnerability summary", }, { category: "other", text: "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-28469", }, { category: "external", summary: "RHBZ#1945459", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1945459", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-28469", url: "https://www.cve.org/CVERecord?id=CVE-2020-28469", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", url: "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", }, ], release_date: "2021-01-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-glob-parent: Regular expression denial of service", }, { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-33502", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-05-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1964461", }, ], notes: [ { category: "description", text: "A flaw was found in normalize-url. Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-normalize-url: ReDoS for data URLs", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-33502", }, { category: "external", summary: "RHBZ#1964461", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1964461", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-33502", url: "https://www.cve.org/CVERecord?id=CVE-2021-33502", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-33502", }, { category: "external", summary: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", url: "https://snyk.io/vuln/SNYK-JS-NORMALIZEURL-1296539", }, ], release_date: "2021-05-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-normalize-url: ReDoS for data URLs", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-25T09:28:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0246", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debuginfo-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-debugsource-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-devel-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-docs-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-full-i18n-1:14.18.2-2.module+el8.4.0+13643+6c0ebf22.x86_64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-nodemon-0:2.0.15-1.module+el8.4.0+13503+fc29810b.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.aarch64", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.ppc64le", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.s390x", "AppStream-8.4.0.Z.EUS:nodejs:14:8040020211213111158:522a0ee4:npm-1:6.14.15-1.14.18.2.2.module+el8.4.0+13643+6c0ebf22.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
rhsa-2022:0041
Vulnerability from csaf_redhat
Published
2022-01-06 18:43
Modified
2025-03-21 01:00
Summary
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
Notes
Topic
An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2). (BZ#2031766)
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.18.2). (BZ#2031766)\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0041", url: "https://access.redhat.com/errata/RHSA-2022:0041", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "2031766", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2031766", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0041.json", }, ], title: "Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update", tracking: { current_release_date: "2025-03-21T01:00:20+00:00", generator: { date: "2025-03-21T01:00:20+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:0041", initial_release_date: "2022-01-06T18:43:03+00:00", revision_history: [ { date: "2022-01-06T18:43:03+00:00", number: "1", summary: "Initial version", }, { date: "2022-01-06T18:43:03+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:00:20+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=src", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product_id: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product_id: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.18.2-1.el7?arch=noarch", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product_id: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6.el7?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.18.2-1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product_id: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-npm@6.14.15-14.18.2.1.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product_id: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.18.2-1.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", }, product_reference: "rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", }, product_reference: "rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", }, product_reference: "rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3807", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2021-09-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2007557", }, ], notes: [ { category: "description", text: "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", title: "Vulnerability summary", }, { category: "other", text: "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as 'will not fix'.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3807", }, { category: "external", summary: "RHBZ#2007557", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3807", url: "https://www.cve.org/CVERecord?id=CVE-2021-3807", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", }, { category: "external", summary: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", url: "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", }, ], release_date: "2021-09-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", }, { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-01-06T18:43:03+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0041", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-debuginfo-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-devel-0:14.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-docs-0:14.18.2-1.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs14-nodejs-nodemon-0:2.0.3-6.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs14-npm-0:6.14.15-14.18.2.1.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, ], }
rhsa-2022:4914
Vulnerability from csaf_redhat
Published
2022-06-06 09:29
Modified
2025-03-21 01:01
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.12). This is the last planned rebase before the collection reaches End of Life.
Security Fix(es):
* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
* minimist: prototype pollution (CVE-2021-44906)
* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)
* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)
* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.12). This is the last planned rebase before the collection reaches End of Life.\n\nSecurity Fix(es):\n\n* nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\n* nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)\n\n* nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)\n\n* nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)\n\n* minimist: prototype pollution (CVE-2021-44906)\n\n* llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959)\n\n* llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960)\n\n* nodejs: Prototype pollution via console.table properties (CVE-2022-21824)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:4914", url: "https://access.redhat.com/errata/RHSA-2022:4914", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "2066009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066009", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4914.json", }, ], title: "Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-21T01:01:00+00:00", generator: { date: "2025-03-21T01:01:00+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2022:4914", initial_release_date: "2022-06-06T09:29:16+00:00", revision_history: [ { date: "2022-06-06T09:29:16+00:00", number: "1", summary: "Initial version", }, { date: "2022-06-06T09:29:16+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-21T01:01:00+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product: { name: "Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for RHEL(v. 7)", product: { name: "Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=x86_64", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product_id: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.22.12-2.el7?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=s390x", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.12-2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product_id: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-npm@6.14.16-12.22.12.2.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product_id: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.12-2.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", }, product_reference: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", product_id: "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", relates_to_product_reference: "7Server-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.src", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", }, product_reference: "rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", }, product_reference: "rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, { category: "default_component_of", full_product_name: { name: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", product_id: "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", }, product_reference: "rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.8", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3918", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2021-11-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2024702", }, ], notes: [ { category: "description", text: "The json-schema Node.JS library was vulnerable to prototype pollution during the validation of a JSON object. An attacker, able to provide a specially crafted JSON file for validation, could use this flaw to modify the behavior of the node program, to, for example, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-json-schema: Prototype pollution vulnerability", title: "Vulnerability summary", }, { category: "other", text: "npm versions 8.0.0 and older provide a vulnerable version of the json-schema library. However, it is currently believed that in the context of npm, it is not possible to take advantage of the vulnerability.\n\nRed Hat Enterprise Linux version 8 and Software Collections provide a vulnerable version of the json-schema library only as embedded in the npm package. As a result, the severity of the incident has been lowered for these 2 products.\n\nRed Hat Quay includes json-schema as a development dependency of quay-registry-container. As a result, the impact rating has been lowered to Moderate.\n\nIn Red Hat OpenShift Container Platform (RHOCP), Red Hat Openshift Data Foundations (ODF), Red Hat distributed tracing, Migration Toolkit for Virtualization (MTV) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth. This restricts access to the vulnerable json-schema library to authenticated users only, therefore the impact is reduced to Moderate.\n\nIn Red Hat Openshift Data Foundations (ODF) the odf4/mcg-core-rhel8 component has \"Will not fix status\", but starting from ODF 4.11 stream this component contains already patched version of the json-schema library. Earlier version of ODF are already under Maintenance Support phase, hence this vulnerability will not be fixed.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-3918", }, { category: "external", summary: "RHBZ#2024702", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2024702", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-3918", url: "https://www.cve.org/CVERecord?id=CVE-2021-3918", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-3918", }, ], release_date: "2021-10-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-json-schema: Prototype pollution vulnerability", }, { cve: "CVE-2021-22959", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014057", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. Spaces as part of the header names were accepted as valid. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling due to spaces in headers", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "RHBZ#2014057", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22959", url: "https://www.cve.org/CVERecord?id=CVE-2021-22959", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling due to spaces in headers", }, { cve: "CVE-2021-22960", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, discovery_date: "2021-10-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2014059", }, ], notes: [ { category: "description", text: "An HTTP Request Smuggling (HRS) vulnerability was found in the llhttp library, used by Node.JS. During the parsing of chunked messages, the chunk size parameter was not validated properly. In situations where HTTP conversations are being proxied (such as proxy, reverse-proxy, load-balancer), an attacker can use this flaw to inject arbitrary messages through the proxy. The highest threat from this vulnerability is to confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "RHBZ#2014059", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-22960", url: "https://www.cve.org/CVERecord?id=CVE-2021-22960", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/", }, ], release_date: "2021-10-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "llhttp: HTTP Request Smuggling when parsing the body of chunked requests", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999731", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "RHBZ#1999731", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999731", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37701", url: "https://www.cve.org/CVERecord?id=CVE-2021-37701", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", url: "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", }, { category: "external", summary: "https://www.npmjs.com/advisories/1779", url: "https://www.npmjs.com/advisories/1779", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, discovery_date: "2021-08-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1999739", }, ], notes: [ { category: "description", text: "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", title: "Vulnerability description", }, { category: "summary", text: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "RHBZ#1999739", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1999739", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-37712", url: "https://www.cve.org/CVERecord?id=CVE-2021-37712", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", }, { category: "external", summary: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", url: "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", }, { category: "external", summary: "https://www.npmjs.com/advisories/1780", url: "https://www.npmjs.com/advisories/1780", }, ], release_date: "2021-08-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", }, { cve: "CVE-2021-44531", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040839", }, ], notes: [ { category: "description", text: "A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry, as opposed to what is specified by the HTTPS protocol. This flaw allows an active person-in-the-middle to forge a certificate and impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Improper handling of URI Subject Alternative Names", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "RHBZ#2040839", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44531", url: "https://www.cve.org/CVERecord?id=CVE-2021-44531", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Improper handling of URI Subject Alternative Names", }, { cve: "CVE-2021-44532", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040846", }, ], notes: [ { category: "description", text: "It was found that node.js did not safely read the x509 certificate generalName format properly, resulting in data injection. A certificate could use a specially crafted extension in order to be successfully validated, permitting an attacker to impersonate a trusted host.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Certificate Verification Bypass via String Injection", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "RHBZ#2040846", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44532", url: "https://www.cve.org/CVERecord?id=CVE-2021-44532", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44532", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Certificate Verification Bypass via String Injection", }, { cve: "CVE-2021-44533", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040856", }, ], notes: [ { category: "description", text: "A flaw was found in node.js, where it did not properly handle multi-value Relative Distinguished Names. This flaw allows a specially crafted x509 certificate to produce a false multi-value Relative Distinguished Name and to inject arbitrary data in node.js libraries.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Incorrect handling of certificate subject and issuer fields", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally, there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore, the Quay component is marked as \"Will not fix\" with impact LOW.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "RHBZ#2040856", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44533", url: "https://www.cve.org/CVERecord?id=CVE-2021-44533", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44533", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "nodejs: Incorrect handling of certificate subject and issuer fields", }, { cve: "CVE-2021-44906", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, discovery_date: "2022-03-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2066009", }, ], notes: [ { category: "description", text: "An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker to trick the library into adding or modifying the properties of Object.prototype, using a constructor or __proto__ payload, resulting in prototype pollution and loss of confidentiality, availability, and integrity.", title: "Vulnerability description", }, { category: "summary", text: "minimist: prototype pollution", title: "Vulnerability summary", }, { category: "other", text: "The original fix for CVE-2020-7598 was incomplete as it was still possible to bypass in some cases. While this flaw (CVE-2021-44906) enables attackers to control objects that they should not have access to, actual exploitation would still require a chain of independent flaws. Even though the CVSS for CVE-2021-44906 is higher than CVE-2020-7598, they are both rated as having Moderate impact.\n\nWithin Red Hat Satellite 6 this flaw has been rated as having a security impact of Low. It is not currently planned to be addressed there, as the minimist library is only included in the -doc subpackage and is part of test fixtures that are not in the execution path used by the rabl gem.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2021-44906", }, { category: "external", summary: "RHBZ#2066009", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2066009", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2021-44906", url: "https://www.cve.org/CVERecord?id=CVE-2021-44906", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-44906", }, { category: "external", summary: "https://github.com/advisories/GHSA-xvch-5gv4-984h", url: "https://github.com/advisories/GHSA-xvch-5gv4-984h", }, ], release_date: "2022-03-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "minimist: prototype pollution", }, { cve: "CVE-2022-21824", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, discovery_date: "2022-01-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2040862", }, ], notes: [ { category: "description", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "Vulnerability description", }, { category: "summary", text: "nodejs: Prototype pollution via console.table properties", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "RHBZ#2040862", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-21824", url: "https://www.cve.org/CVERecord?id=CVE-2022-21824", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", }, { category: "external", summary: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", url: "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", }, ], release_date: "2022-01-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-06-06T09:29:16+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:4914", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Server-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Server-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.src", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-debuginfo-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-devel-0:12.22.12-2.el7.x86_64", "7Workstation-RHSCL-3.8:rh-nodejs12-nodejs-docs-0:12.22.12-2.el7.noarch", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.ppc64le", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.s390x", "7Workstation-RHSCL-3.8:rh-nodejs12-npm-0:6.14.16-12.22.12.2.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "nodejs: Prototype pollution via console.table properties", }, ], }
WID-SEC-W-2022-0093
Vulnerability from csaf_certbund
Published
2021-10-12 22:00
Modified
2024-05-09 22:00
Summary
Node.js: Mehrere Schwachstellen ermöglichen "HTTP request smuggling"
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen "HTTP request smuggling" Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen \"HTTP request smuggling\" Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0093 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0093.json", }, { category: "self", summary: "WID-SEC-2022-0093 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0093", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202110-5 vom 2021-10-21", url: "https://security.archlinux.org/ASA-202110-5", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202110-4 vom 2021-10-21", url: "https://security.archlinux.org/ASA-202110-4", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202110-6 vom 2021-10-21", url: "https://security.archlinux.org/ASA-202110-6", }, { category: "external", summary: "Node.js October 2021 Security Releases vom 2021-10-12", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3886-1 vom 2021-12-02", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3940-1 vom 2021-12-06", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3964-1 vom 2021-12-07", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-5171 vom 2021-12-16", url: "http://linux.oracle.com/errata/ELSA-2021-5171.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:5171 vom 2021-12-16", url: "https://access.redhat.com/errata/RHSA-2021:5171", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0041 vom 2022-01-06", url: "https://access.redhat.com/errata/RHSA-2022:0041", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0101-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0246 vom 2022-01-25", url: "https://access.redhat.com/errata/RHSA-2022:0246", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-013 vom 2022-01-27", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-013.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:4914 vom 2022-06-06", url: "https://access.redhat.com/errata/RHSA-2022:4914", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0350 vom 2022-02-02", url: "https://access.redhat.com/errata/RHSA-2022:0350", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-0350 vom 2022-02-02", url: "http://linux.oracle.com/errata/ELSA-2022-0350.html", }, { category: "external", summary: "Debian Security Advisory DSA-5170 vom 2022-06-27", url: "https://lists.debian.org/debian-security-announce/2022/msg00138.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2855-1 vom 2022-08-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-214 vom 2022-12-09", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-214.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202405-29 vom 2024-05-08", url: "https://security.gentoo.org/glsa/202405-29", }, ], source_lang: "en-US", title: "Node.js: Mehrere Schwachstellen ermöglichen \"HTTP request smuggling\"", tracking: { current_release_date: "2024-05-09T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:28.326+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0093", initial_release_date: "2021-10-12T22:00:00.000+00:00", revision_history: [ { date: "2021-10-12T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-10-17T22:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2021-9818CABE0D", }, { date: "2021-10-21T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Arch Linux aufgenommen", }, { date: "2021-12-02T23:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-06T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-07T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-16T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Oracle Linux und Red Hat aufgenommen", }, { date: "2022-01-06T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-01-18T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-01-24T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-01-27T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-02-01T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-02T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-06-06T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-06-27T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-08-21T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-12-11T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-05-09T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Gentoo aufgenommen", }, ], status: "final", version: "18", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source Arch Linux", product: { name: "Open Source Arch Linux", product_id: "T013312", product_identification_helper: { cpe: "cpe:/o:archlinux:archlinux:-", }, }, }, { branches: [ { category: "product_version", name: "12.x", product: { name: "Open Source Node.js 12.x", product_id: "T019652", product_identification_helper: { cpe: "cpe:/a:nodejs:nodejs:12.x", }, }, }, { category: "product_version", name: "14.x", product: { name: "Open Source Node.js 14.x", product_id: "T019653", product_identification_helper: { cpe: "cpe:/a:nodejs:nodejs:14.x", }, }, }, { category: "product_version", name: "16.x", product: { name: "Open Source Node.js 16.x", product_id: "T019654", product_identification_helper: { cpe: "cpe:/a:nodejs:nodejs:16.x", }, }, }, ], category: "product_name", name: "Node.js", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", notes: [ { category: "description", text: "In Node.js existieren mehrere Schwachstellen im http Parser. Chunked requests und Header-Namen mit Leerzeichen werden nicht ordnungsgemäß verarbeitet. Ein Angreifer kann dieses zu einem \"HTTP request smuggling\" nutzen und in der Folge u. a. Sicherheitsmechanismen umgehen, Daten manipulieren oder Authentisierungsmerkmale stehlen.", }, ], product_status: { known_affected: [ "T019654", "T019653", "2951", "T002207", "67646", "T013312", "398363", "T012167", "T004914", "T019652", ], }, release_date: "2021-10-12T22:00:00.000+00:00", title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", notes: [ { category: "description", text: "In Node.js existieren mehrere Schwachstellen im http Parser. Chunked requests und Header-Namen mit Leerzeichen werden nicht ordnungsgemäß verarbeitet. Ein Angreifer kann dieses zu einem \"HTTP request smuggling\" nutzen und in der Folge u. a. Sicherheitsmechanismen umgehen, Daten manipulieren oder Authentisierungsmerkmale stehlen.", }, ], product_status: { known_affected: [ "T019654", "T019653", "2951", "T002207", "67646", "T013312", "398363", "T012167", "T004914", "T019652", ], }, release_date: "2021-10-12T22:00:00.000+00:00", title: "CVE-2021-22960", }, ], }
wid-sec-w-2022-0093
Vulnerability from csaf_certbund
Published
2021-10-12 22:00
Modified
2024-05-09 22:00
Summary
Node.js: Mehrere Schwachstellen ermöglichen "HTTP request smuggling"
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen "HTTP request smuggling" Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen \"HTTP request smuggling\" Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0093 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0093.json", }, { category: "self", summary: "WID-SEC-2022-0093 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0093", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202110-5 vom 2021-10-21", url: "https://security.archlinux.org/ASA-202110-5", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202110-4 vom 2021-10-21", url: "https://security.archlinux.org/ASA-202110-4", }, { category: "external", summary: "Arch Linux Security Advisory ASA-202110-6 vom 2021-10-21", url: "https://security.archlinux.org/ASA-202110-6", }, { category: "external", summary: "Node.js October 2021 Security Releases vom 2021-10-12", url: "https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3886-1 vom 2021-12-02", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3940-1 vom 2021-12-06", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:3964-1 vom 2021-12-07", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-5171 vom 2021-12-16", url: "http://linux.oracle.com/errata/ELSA-2021-5171.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:5171 vom 2021-12-16", url: "https://access.redhat.com/errata/RHSA-2021:5171", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0041 vom 2022-01-06", url: "https://access.redhat.com/errata/RHSA-2022:0041", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0101-1 vom 2022-01-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0246 vom 2022-01-25", url: "https://access.redhat.com/errata/RHSA-2022:0246", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-013 vom 2022-01-27", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-013.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:4914 vom 2022-06-06", url: "https://access.redhat.com/errata/RHSA-2022:4914", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0350 vom 2022-02-02", url: "https://access.redhat.com/errata/RHSA-2022:0350", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-0350 vom 2022-02-02", url: "http://linux.oracle.com/errata/ELSA-2022-0350.html", }, { category: "external", summary: "Debian Security Advisory DSA-5170 vom 2022-06-27", url: "https://lists.debian.org/debian-security-announce/2022/msg00138.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2855-1 vom 2022-08-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-214 vom 2022-12-09", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-214.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202405-29 vom 2024-05-08", url: "https://security.gentoo.org/glsa/202405-29", }, ], source_lang: "en-US", title: "Node.js: Mehrere Schwachstellen ermöglichen \"HTTP request smuggling\"", tracking: { current_release_date: "2024-05-09T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:28.326+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0093", initial_release_date: "2021-10-12T22:00:00.000+00:00", revision_history: [ { date: "2021-10-12T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-10-17T22:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2021-9818CABE0D", }, { date: "2021-10-21T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Arch Linux aufgenommen", }, { date: "2021-12-02T23:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-06T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-07T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-12-16T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Oracle Linux und Red Hat aufgenommen", }, { date: "2022-01-06T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-01-18T23:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-01-24T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-01-27T23:00:00.000+00:00", number: "11", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-02-01T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-02T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-06-06T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-06-27T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-08-21T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-12-11T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-05-09T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Gentoo aufgenommen", }, ], status: "final", version: "18", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source Arch Linux", product: { name: "Open Source Arch Linux", product_id: "T013312", product_identification_helper: { cpe: "cpe:/o:archlinux:archlinux:-", }, }, }, { branches: [ { category: "product_version", name: "12.x", product: { name: "Open Source Node.js 12.x", product_id: "T019652", product_identification_helper: { cpe: "cpe:/a:nodejs:nodejs:12.x", }, }, }, { category: "product_version", name: "14.x", product: { name: "Open Source Node.js 14.x", product_id: "T019653", product_identification_helper: { cpe: "cpe:/a:nodejs:nodejs:14.x", }, }, }, { category: "product_version", name: "16.x", product: { name: "Open Source Node.js 16.x", product_id: "T019654", product_identification_helper: { cpe: "cpe:/a:nodejs:nodejs:16.x", }, }, }, ], category: "product_name", name: "Node.js", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", notes: [ { category: "description", text: "In Node.js existieren mehrere Schwachstellen im http Parser. Chunked requests und Header-Namen mit Leerzeichen werden nicht ordnungsgemäß verarbeitet. Ein Angreifer kann dieses zu einem \"HTTP request smuggling\" nutzen und in der Folge u. a. Sicherheitsmechanismen umgehen, Daten manipulieren oder Authentisierungsmerkmale stehlen.", }, ], product_status: { known_affected: [ "T019654", "T019653", "2951", "T002207", "67646", "T013312", "398363", "T012167", "T004914", "T019652", ], }, release_date: "2021-10-12T22:00:00.000+00:00", title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", notes: [ { category: "description", text: "In Node.js existieren mehrere Schwachstellen im http Parser. Chunked requests und Header-Namen mit Leerzeichen werden nicht ordnungsgemäß verarbeitet. Ein Angreifer kann dieses zu einem \"HTTP request smuggling\" nutzen und in der Folge u. a. Sicherheitsmechanismen umgehen, Daten manipulieren oder Authentisierungsmerkmale stehlen.", }, ], product_status: { known_affected: [ "T019654", "T019653", "2951", "T002207", "67646", "T013312", "398363", "T012167", "T004914", "T019652", ], }, release_date: "2021-10-12T22:00:00.000+00:00", title: "CVE-2021-22960", }, ], }
fkie_cve-2021-22960
Vulnerability from fkie_nvd
Published
2021-11-03 20:15
Modified
2024-11-21 05:51
Severity ?
Summary
The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/1238099 | Exploit, Issue Tracking, Third Party Advisory | |
support@hackerone.com | https://www.debian.org/security/2022/dsa-5170 | Third Party Advisory | |
support@hackerone.com | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1238099 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5170 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*", matchCriteriaId: "6B7CB576-CA48-462E-A360-6CE14FADCC6A", versionEndExcluding: "2.1.4", vulnerable: true, }, { criteria: "cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*", matchCriteriaId: "AF1511BB-A1F0-4AF9-80C3-5EB6317F8525", versionEndExcluding: "6.0.6", versionStartIncluding: "3.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*", matchCriteriaId: "9F300E13-1B40-4B35-ACA5-4D402CD41055", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*", matchCriteriaId: "B10E38A6-783C-45A2-98A1-12FA1EB3D3AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", }, { lang: "es", value: "La función parse en llhttp versiones anteriores a 2.1.4 y versiones anteriores a 6.0.6. ignora las extensiones chunk cuando analiza el cuerpo de las peticiones chunked. Esto conlleva a un Contrabando de Peticiones HTTP (HRS) bajo determinadas condiciones", }, ], id: "CVE-2021-22960", lastModified: "2024-11-21T05:51:01.460", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-03T20:15:08.247", references: [ { source: "support@hackerone.com", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://hackerone.com/reports/1238099", }, { source: "support@hackerone.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5170", }, { source: "support@hackerone.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://hackerone.com/reports/1238099", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5170", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, ], sourceIdentifier: "support@hackerone.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-444", }, ], source: "support@hackerone.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-444", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
suse-su-2021:3964-1
Vulnerability from csaf_suse
Published
2021-12-07 07:57
Modified
2021-12-07 07:57
Summary
Security update for nodejs14
Notes
Title of the patch
Security update for nodejs14
Description of the patch
This update for nodejs14 fixes the following issues:
nodejs14 was updated to 14.18.1:
* deps: update llhttp to 2.1.4
- HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)
- HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)
Changes in 14.18.0:
* buffer:
+ introduce Blob
+ add base64url encoding option
* child_process:
+ allow options.cwd receive a URL
+ add timeout to spawn and fork
+ allow promisified exec to be cancel
+ add 'overlapped' stdio flag
* dns: add 'tries' option to Resolve options
* fs:
+ allow empty string for temp directory prefix
+ allow no-params fsPromises fileHandle read
+ add support for async iterators to fsPromises.writeFile
* http2: add support for sensitive headers
* process: add 'worker' event
* tls: allow reading data into a static buffer
* worker: add setEnvironmentData/getEnvironmentData
Changes in 14.17.6
* deps: upgrade npm to 6.14.15 which fixes a number of
security issues
(bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,
bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,
bsc#1190053, CVE-2021-39135)
Patchnames
SUSE-2021-3964,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-3964,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-3964
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs14", title: "Title of the patch", }, { category: "description", text: "This update for nodejs14 fixes the following issues:\n\nnodejs14 was updated to 14.18.1:\n\n* deps: update llhttp to 2.1.4\n\n - HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)\n - HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)\n\nChanges in 14.18.0:\n\n * buffer:\n\n + introduce Blob\n + add base64url encoding option\n\n * child_process:\n\n + allow options.cwd receive a URL\n + add timeout to spawn and fork\n + allow promisified exec to be cancel\n + add 'overlapped' stdio flag\n\n * dns: add 'tries' option to Resolve options\n * fs:\n\n + allow empty string for temp directory prefix\n + allow no-params fsPromises fileHandle read\n + add support for async iterators to fsPromises.writeFile\n\n * http2: add support for sensitive headers\n * process: add 'worker' event\n * tls: allow reading data into a static buffer\n * worker: add setEnvironmentData/getEnvironmentData\n\nChanges in 14.17.6\n\n * deps: upgrade npm to 6.14.15 which fixes a number of\n security issues\n (bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,\n bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,\n bsc#1190053, CVE-2021-39135)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3964,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-3964,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-3964", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3964-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3964-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213964-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3964-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs14", tracking: { current_release_date: "2021-12-07T07:57:42Z", generator: { date: "2021-12-07T07:57:42Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3964-1", initial_release_date: "2021-12-07T07:57:42Z", revision_history: [ { date: "2021-12-07T07:57:42Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.aarch64", product: { name: "nodejs14-14.18.1-15.21.2.aarch64", product_id: "nodejs14-14.18.1-15.21.2.aarch64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.aarch64", product: { name: "nodejs14-devel-14.18.1-15.21.2.aarch64", product_id: "nodejs14-devel-14.18.1-15.21.2.aarch64", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.aarch64", product: { name: "npm14-14.18.1-15.21.2.aarch64", product_id: "npm14-14.18.1-15.21.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.i586", product: { name: "nodejs14-14.18.1-15.21.2.i586", product_id: "nodejs14-14.18.1-15.21.2.i586", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.i586", product: { name: "nodejs14-devel-14.18.1-15.21.2.i586", product_id: "nodejs14-devel-14.18.1-15.21.2.i586", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.i586", product: { name: "npm14-14.18.1-15.21.2.i586", product_id: "npm14-14.18.1-15.21.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "nodejs14-docs-14.18.1-15.21.2.noarch", product: { name: "nodejs14-docs-14.18.1-15.21.2.noarch", product_id: "nodejs14-docs-14.18.1-15.21.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.ppc64le", product: { name: "nodejs14-14.18.1-15.21.2.ppc64le", product_id: "nodejs14-14.18.1-15.21.2.ppc64le", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.ppc64le", product: { name: "nodejs14-devel-14.18.1-15.21.2.ppc64le", product_id: "nodejs14-devel-14.18.1-15.21.2.ppc64le", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.ppc64le", product: { name: "npm14-14.18.1-15.21.2.ppc64le", product_id: "npm14-14.18.1-15.21.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.s390x", product: { name: "nodejs14-14.18.1-15.21.2.s390x", product_id: "nodejs14-14.18.1-15.21.2.s390x", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.s390x", product: { name: "nodejs14-devel-14.18.1-15.21.2.s390x", product_id: "nodejs14-devel-14.18.1-15.21.2.s390x", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.s390x", product: { name: "npm14-14.18.1-15.21.2.s390x", product_id: "npm14-14.18.1-15.21.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-15.21.2.x86_64", product: { name: "nodejs14-14.18.1-15.21.2.x86_64", product_id: "nodejs14-14.18.1-15.21.2.x86_64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-15.21.2.x86_64", product: { name: "nodejs14-devel-14.18.1-15.21.2.x86_64", product_id: "nodejs14-devel-14.18.1-15.21.2.x86_64", }, }, { category: "product_version", name: "npm14-14.18.1-15.21.2.x86_64", product: { name: "npm14-14.18.1-15.21.2.x86_64", product_id: "npm14-14.18.1-15.21.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", }, product_reference: "nodejs14-14.18.1-15.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", }, product_reference: "nodejs14-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", }, product_reference: "nodejs14-14.18.1-15.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", }, product_reference: "nodejs14-14.18.1-15.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-15.21.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", }, product_reference: "nodejs14-docs-14.18.1-15.21.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", }, product_reference: "npm14-14.18.1-15.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", }, product_reference: "npm14-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", }, product_reference: "npm14-14.18.1-15.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", }, product_reference: "npm14-14.18.1-15.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", }, product_reference: "nodejs14-14.18.1-15.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", }, product_reference: "nodejs14-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", }, product_reference: "nodejs14-14.18.1-15.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-15.21.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", }, product_reference: "nodejs14-14.18.1-15.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-15.21.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", }, product_reference: "nodejs14-devel-14.18.1-15.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-15.21.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", }, product_reference: "nodejs14-docs-14.18.1-15.21.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", }, product_reference: "npm14-14.18.1-15.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", }, product_reference: "npm14-14.18.1-15.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", }, product_reference: "npm14-14.18.1-15.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-15.21.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", }, product_reference: "npm14-14.18.1-15.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-devel-14.18.1-15.21.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs14-docs-14.18.1-15.21.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm14-14.18.1-15.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-07T07:57:42Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
suse-su-2021:3940-1
Vulnerability from csaf_suse
Published
2021-12-06 13:43
Modified
2021-12-06 13:43
Summary
Security update for nodejs12
Notes
Title of the patch
Security update for nodejs12
Description of the patch
This update for nodejs12 fixes the following issues:
- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057).
- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056).
- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055).
- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054).
- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053).
Patchnames
SUSE-2021-3940,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-3940,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-3940
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs12", title: "Title of the patch", }, { category: "description", text: "This update for nodejs12 fixes the following issues:\n\n- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).\n- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).\n- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057). \n- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056). \n- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055). \n- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054). \n- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053). \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3940,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-3940,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-3940", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3940-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3940-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213940-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3940-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs12", tracking: { current_release_date: "2021-12-06T13:43:50Z", generator: { date: "2021-12-06T13:43:50Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3940-1", initial_release_date: "2021-12-06T13:43:50Z", revision_history: [ { date: "2021-12-06T13:43:50Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.aarch64", product: { name: "nodejs12-12.22.7-4.22.1.aarch64", product_id: "nodejs12-12.22.7-4.22.1.aarch64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.aarch64", product: { name: "nodejs12-devel-12.22.7-4.22.1.aarch64", product_id: "nodejs12-devel-12.22.7-4.22.1.aarch64", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.aarch64", product: { name: "npm12-12.22.7-4.22.1.aarch64", product_id: "npm12-12.22.7-4.22.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.i586", product: { name: "nodejs12-12.22.7-4.22.1.i586", product_id: "nodejs12-12.22.7-4.22.1.i586", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.i586", product: { name: "nodejs12-devel-12.22.7-4.22.1.i586", product_id: "nodejs12-devel-12.22.7-4.22.1.i586", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.i586", product: { name: "npm12-12.22.7-4.22.1.i586", product_id: "npm12-12.22.7-4.22.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "nodejs12-docs-12.22.7-4.22.1.noarch", product: { name: "nodejs12-docs-12.22.7-4.22.1.noarch", product_id: "nodejs12-docs-12.22.7-4.22.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.ppc64le", product: { name: "nodejs12-12.22.7-4.22.1.ppc64le", product_id: "nodejs12-12.22.7-4.22.1.ppc64le", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.ppc64le", product: { name: "nodejs12-devel-12.22.7-4.22.1.ppc64le", product_id: "nodejs12-devel-12.22.7-4.22.1.ppc64le", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.ppc64le", product: { name: "npm12-12.22.7-4.22.1.ppc64le", product_id: "npm12-12.22.7-4.22.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.s390x", product: { name: "nodejs12-12.22.7-4.22.1.s390x", product_id: "nodejs12-12.22.7-4.22.1.s390x", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.s390x", product: { name: "nodejs12-devel-12.22.7-4.22.1.s390x", product_id: "nodejs12-devel-12.22.7-4.22.1.s390x", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.s390x", product: { name: "npm12-12.22.7-4.22.1.s390x", product_id: "npm12-12.22.7-4.22.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.7-4.22.1.x86_64", product: { name: "nodejs12-12.22.7-4.22.1.x86_64", product_id: "nodejs12-12.22.7-4.22.1.x86_64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.7-4.22.1.x86_64", product: { name: "nodejs12-devel-12.22.7-4.22.1.x86_64", product_id: "nodejs12-devel-12.22.7-4.22.1.x86_64", }, }, { category: "product_version", name: "npm12-12.22.7-4.22.1.x86_64", product: { name: "npm12-12.22.7-4.22.1.x86_64", product_id: "npm12-12.22.7-4.22.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", }, product_reference: "nodejs12-12.22.7-4.22.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", }, product_reference: "nodejs12-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", }, product_reference: "nodejs12-12.22.7-4.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", }, product_reference: "nodejs12-12.22.7-4.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-docs-12.22.7-4.22.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", }, product_reference: "nodejs12-docs-12.22.7-4.22.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", }, product_reference: "npm12-12.22.7-4.22.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", }, product_reference: "npm12-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", }, product_reference: "npm12-12.22.7-4.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP2", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", }, product_reference: "npm12-12.22.7-4.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", }, product_reference: "nodejs12-12.22.7-4.22.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", }, product_reference: "nodejs12-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", }, product_reference: "nodejs12-12.22.7-4.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.7-4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", }, product_reference: "nodejs12-12.22.7-4.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.7-4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", }, product_reference: "nodejs12-devel-12.22.7-4.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "nodejs12-docs-12.22.7-4.22.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", }, product_reference: "nodejs12-docs-12.22.7-4.22.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", }, product_reference: "npm12-12.22.7-4.22.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", }, product_reference: "npm12-12.22.7-4.22.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", }, product_reference: "npm12-12.22.7-4.22.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.7-4.22.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP3", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", }, product_reference: "npm12-12.22.7-4.22.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP2:npm12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-devel-12.22.7-4.22.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:nodejs12-docs-12.22.7-4.22.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP3:npm12-12.22.7-4.22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-06T13:43:50Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
suse-su-2022:2855-1
Vulnerability from csaf_suse
Published
2022-08-19 14:08
Modified
2022-08-19 14:08
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 fixes the following issues:
- CVE-2021-22930, CVE-2021-22940: Fixed two memory corruption issues
during HTTP/2 stream cancellation (bsc#1188917, bsc#1189368).
- CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2021-22960,
CVE-2021-22959: Fixed multiple HTTP request smuggling issues in
the underlying HTTP parser (bsc#1201325, bsc#1201326, bsc#1201327,
bsc#1191602, bsc#1191601).
- CVE-2022-32212: Fixed a DNS rebinding issue caused by improper IPv4
validation (bsc#1201328).
Patchnames
SUSE-2022-2855,SUSE-SLE-Product-HPC-15-2022-2855,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2855,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2855,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2855,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2855,SUSE-SLE-Product-SLES-15-2022-2855,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2855,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2855,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2855,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2855,SUSE-SLE-Product-SLES_SAP-15-2022-2855,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2855,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2855,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2855,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2855,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2855,SUSE-Storage-6-2022-2855,SUSE-Storage-7-2022-2855,openSUSE-SLE-15.3-2022-2855,openSUSE-SLE-15.4-2022-2855
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs10", title: "Title of the patch", }, { category: "description", text: "This update for nodejs10 fixes the following issues:\n\n- CVE-2021-22930, CVE-2021-22940: Fixed two memory corruption issues\n during HTTP/2 stream cancellation (bsc#1188917, bsc#1189368).\n- CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2021-22960,\n CVE-2021-22959: Fixed multiple HTTP request smuggling issues in\n the underlying HTTP parser (bsc#1201325, bsc#1201326, bsc#1201327, \n bsc#1191602, bsc#1191601).\n- CVE-2022-32212: Fixed a DNS rebinding issue caused by improper IPv4\n validation (bsc#1201328).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2855,SUSE-SLE-Product-HPC-15-2022-2855,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2855,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2855,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2855,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2855,SUSE-SLE-Product-SLES-15-2022-2855,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2855,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2855,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2855,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2855,SUSE-SLE-Product-SLES_SAP-15-2022-2855,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2855,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2855,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2855,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2855,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2855,SUSE-Storage-6-2022-2855,SUSE-Storage-7-2022-2855,openSUSE-SLE-15.3-2022-2855,openSUSE-SLE-15.4-2022-2855", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2855-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2855-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222855-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2855-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html", }, { category: "self", summary: "SUSE Bug 1188917", url: "https://bugzilla.suse.com/1188917", }, { category: "self", summary: "SUSE Bug 1189368", url: "https://bugzilla.suse.com/1189368", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE Bug 1201325", url: "https://bugzilla.suse.com/1201325", }, { category: "self", summary: "SUSE Bug 1201326", url: "https://bugzilla.suse.com/1201326", }, { category: "self", summary: "SUSE Bug 1201327", url: "https://bugzilla.suse.com/1201327", }, { category: "self", summary: "SUSE Bug 1201328", url: "https://bugzilla.suse.com/1201328", }, { category: "self", summary: "SUSE CVE CVE-2021-22930 page", url: "https://www.suse.com/security/cve/CVE-2021-22930/", }, { category: "self", summary: "SUSE CVE CVE-2021-22940 page", url: "https://www.suse.com/security/cve/CVE-2021-22940/", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2022-32212 page", url: "https://www.suse.com/security/cve/CVE-2022-32212/", }, { category: "self", summary: "SUSE CVE CVE-2022-32213 page", url: "https://www.suse.com/security/cve/CVE-2022-32213/", }, { category: "self", summary: "SUSE CVE CVE-2022-32214 page", url: "https://www.suse.com/security/cve/CVE-2022-32214/", }, { category: "self", summary: "SUSE CVE CVE-2022-32215 page", url: "https://www.suse.com/security/cve/CVE-2022-32215/", }, ], title: "Security update for nodejs10", tracking: { current_release_date: "2022-08-19T14:08:24Z", generator: { date: "2022-08-19T14:08:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2855-1", initial_release_date: "2022-08-19T14:08:24Z", revision_history: [ { date: "2022-08-19T14:08:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs10-10.24.1-150000.1.47.1.aarch64", product: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64", product_id: "nodejs10-10.24.1-150000.1.47.1.aarch64", }, }, { category: "product_version", name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", product: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", product_id: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, }, { category: "product_version", name: "npm10-10.24.1-150000.1.47.1.aarch64", product: { name: "npm10-10.24.1-150000.1.47.1.aarch64", product_id: "npm10-10.24.1-150000.1.47.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs10-10.24.1-150000.1.47.1.i586", product: { name: "nodejs10-10.24.1-150000.1.47.1.i586", product_id: "nodejs10-10.24.1-150000.1.47.1.i586", }, }, { category: "product_version", name: "nodejs10-devel-10.24.1-150000.1.47.1.i586", product: { name: "nodejs10-devel-10.24.1-150000.1.47.1.i586", product_id: "nodejs10-devel-10.24.1-150000.1.47.1.i586", }, }, { category: "product_version", name: "npm10-10.24.1-150000.1.47.1.i586", product: { name: "npm10-10.24.1-150000.1.47.1.i586", product_id: "npm10-10.24.1-150000.1.47.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", product: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", product_id: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs10-10.24.1-150000.1.47.1.ppc64le", product: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le", product_id: "nodejs10-10.24.1-150000.1.47.1.ppc64le", }, }, { category: "product_version", name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", product: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", product_id: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, }, { category: "product_version", name: "npm10-10.24.1-150000.1.47.1.ppc64le", product: { name: "npm10-10.24.1-150000.1.47.1.ppc64le", product_id: "npm10-10.24.1-150000.1.47.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs10-10.24.1-150000.1.47.1.s390x", product: { name: "nodejs10-10.24.1-150000.1.47.1.s390x", product_id: "nodejs10-10.24.1-150000.1.47.1.s390x", }, }, { category: "product_version", name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", product: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", product_id: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, }, { category: "product_version", name: "npm10-10.24.1-150000.1.47.1.s390x", product: { name: "npm10-10.24.1-150000.1.47.1.s390x", product_id: "npm10-10.24.1-150000.1.47.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs10-10.24.1-150000.1.47.1.x86_64", product: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64", product_id: "nodejs10-10.24.1-150000.1.47.1.x86_64", }, }, { category: "product_version", name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", product: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", product_id: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, }, { category: "product_version", name: "npm10-10.24.1-150000.1.47.1.x86_64", product: { name: "npm10-10.24.1-150000.1.47.1.x86_64", product_id: "npm10-10.24.1-150000.1.47.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", }, product_reference: "npm10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", }, product_reference: "npm10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", }, product_reference: "npm10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", }, product_reference: "npm10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", }, product_reference: "npm10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-10.24.1-150000.1.47.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", }, product_reference: "nodejs10-devel-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "nodejs10-docs-10.24.1-150000.1.47.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", }, product_reference: "nodejs10-docs-10.24.1-150000.1.47.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", }, product_reference: "npm10-10.24.1-150000.1.47.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", }, product_reference: "npm10-10.24.1-150000.1.47.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", }, product_reference: "npm10-10.24.1-150000.1.47.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "npm10-10.24.1-150000.1.47.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", }, product_reference: "npm10-10.24.1-150000.1.47.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22930", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22930", }, ], notes: [ { category: "general", text: "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22930", url: "https://www.suse.com/security/cve/CVE-2021-22930", }, { category: "external", summary: "SUSE Bug 1188917 for CVE-2021-22930", url: "https://bugzilla.suse.com/1188917", }, { category: "external", summary: "SUSE Bug 1189368 for CVE-2021-22930", url: "https://bugzilla.suse.com/1189368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "critical", }, ], title: "CVE-2021-22930", }, { cve: "CVE-2021-22940", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22940", }, ], notes: [ { category: "general", text: "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22940", url: "https://www.suse.com/security/cve/CVE-2021-22940", }, { category: "external", summary: "SUSE Bug 1189368 for CVE-2021-22940", url: "https://bugzilla.suse.com/1189368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "critical", }, ], title: "CVE-2021-22940", }, { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2022-32212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32212", }, ], notes: [ { category: "general", text: "A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32212", url: "https://www.suse.com/security/cve/CVE-2022-32212", }, { category: "external", summary: "SUSE Bug 1201328 for CVE-2022-32212", url: "https://bugzilla.suse.com/1201328", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "important", }, ], title: "CVE-2022-32212", }, { cve: "CVE-2022-32213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32213", }, ], notes: [ { category: "general", text: "The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32213", url: "https://www.suse.com/security/cve/CVE-2022-32213", }, { category: "external", summary: "SUSE Bug 1201325 for CVE-2022-32213", url: "https://bugzilla.suse.com/1201325", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "moderate", }, ], title: "CVE-2022-32213", }, { cve: "CVE-2022-32214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32214", }, ], notes: [ { category: "general", text: "The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32214", url: "https://www.suse.com/security/cve/CVE-2022-32214", }, { category: "external", summary: "SUSE Bug 1201326 for CVE-2022-32214", url: "https://bugzilla.suse.com/1201326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "moderate", }, ], title: "CVE-2022-32214", }, { cve: "CVE-2022-32215", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32215", }, ], notes: [ { category: "general", text: "The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32215", url: "https://www.suse.com/security/cve/CVE-2022-32215", }, { category: "external", summary: "SUSE Bug 1201327 for CVE-2022-32215", url: "https://bugzilla.suse.com/1201327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 6:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 6:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Enterprise Storage 7:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Enterprise Storage 7:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Proxy 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Proxy 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Retail Branch Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Retail Branch Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "SUSE Manager Server 4.1:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.ppc64le", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.s390x", "SUSE Manager Server 4.1:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.3:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.3:npm10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:nodejs10-devel-10.24.1-150000.1.47.1.x86_64", "openSUSE Leap 15.4:nodejs10-docs-10.24.1-150000.1.47.1.noarch", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.aarch64", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.ppc64le", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.s390x", "openSUSE Leap 15.4:npm10-10.24.1-150000.1.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-08-19T14:08:24Z", details: "moderate", }, ], title: "CVE-2022-32215", }, ], }
suse-su-2021:3886-1
Vulnerability from csaf_suse
Published
2021-12-02 12:51
Modified
2021-12-02 12:51
Summary
Security update for nodejs14
Notes
Title of the patch
Security update for nodejs14
Description of the patch
This update for nodejs14 fixes the following issues:
nodejs14 was updated to 14.18.1:
* deps: update llhttp to 2.1.4
Security fixes:
- HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)
- HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)
Changes in 14.18.0:
* buffer:
+ introduce Blob
+ add base64url encoding option
* child_process:
+ allow options.cwd receive a URL
+ add timeout to spawn and fork
+ allow promisified exec to be cancel
+ add 'overlapped' stdio flag
* dns: add 'tries' option to Resolve options
* fs:
+ allow empty string for temp directory prefix
+ allow no-params fsPromises fileHandle read
+ add support for async iterators to fsPromises.writeFile
* http2: add support for sensitive headers
* process: add 'worker' event
* tls: allow reading data into a static buffer
* worker: add setEnvironmentData/getEnvironmentData
Changes in 14.17.6:
* deps: upgrade npm to 6.14.15 which fixes a number of
security issues
(bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,
bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,
bsc#1190053, CVE-2021-39135)
Patchnames
SUSE-2021-3886,SUSE-SLE-Module-Web-Scripting-12-2021-3886
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs14", title: "Title of the patch", }, { category: "description", text: "This update for nodejs14 fixes the following issues:\n\nnodejs14 was updated to 14.18.1:\n\n* deps: update llhttp to 2.1.4\n\nSecurity fixes:\n\n- HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)\n- HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)\n\nChanges in 14.18.0:\n\n * buffer:\n\n + introduce Blob\n + add base64url encoding option\n\n * child_process:\n\n + allow options.cwd receive a URL\n + add timeout to spawn and fork\n + allow promisified exec to be cancel\n + add 'overlapped' stdio flag\n\n * dns: add 'tries' option to Resolve options\n * fs:\n\n + allow empty string for temp directory prefix\n + allow no-params fsPromises fileHandle read\n + add support for async iterators to fsPromises.writeFile\n\n * http2: add support for sensitive headers\n * process: add 'worker' event\n * tls: allow reading data into a static buffer\n * worker: add setEnvironmentData/getEnvironmentData\n\nChanges in 14.17.6:\n\n * deps: upgrade npm to 6.14.15 which fixes a number of\n security issues\n (bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,\n bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,\n bsc#1190053, CVE-2021-39135)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-3886,SUSE-SLE-Module-Web-Scripting-12-2021-3886", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3886-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:3886-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20213886-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:3886-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, ], title: "Security update for nodejs14", tracking: { current_release_date: "2021-12-02T12:51:24Z", generator: { date: "2021-12-02T12:51:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:3886-1", initial_release_date: "2021-12-02T12:51:24Z", revision_history: [ { date: "2021-12-02T12:51:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs14-14.18.1-6.18.2.aarch64", product: { name: "nodejs14-14.18.1-6.18.2.aarch64", product_id: "nodejs14-14.18.1-6.18.2.aarch64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-6.18.2.aarch64", product: { name: "nodejs14-devel-14.18.1-6.18.2.aarch64", product_id: "nodejs14-devel-14.18.1-6.18.2.aarch64", }, }, { category: "product_version", name: "npm14-14.18.1-6.18.2.aarch64", product: { name: "npm14-14.18.1-6.18.2.aarch64", product_id: "npm14-14.18.1-6.18.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-6.18.2.i586", product: { name: "nodejs14-14.18.1-6.18.2.i586", product_id: "nodejs14-14.18.1-6.18.2.i586", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-6.18.2.i586", product: { name: "nodejs14-devel-14.18.1-6.18.2.i586", product_id: "nodejs14-devel-14.18.1-6.18.2.i586", }, }, { category: "product_version", name: "npm14-14.18.1-6.18.2.i586", product: { name: "npm14-14.18.1-6.18.2.i586", product_id: "npm14-14.18.1-6.18.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "nodejs14-docs-14.18.1-6.18.2.noarch", product: { name: "nodejs14-docs-14.18.1-6.18.2.noarch", product_id: "nodejs14-docs-14.18.1-6.18.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-6.18.2.ppc64le", product: { name: "nodejs14-14.18.1-6.18.2.ppc64le", product_id: "nodejs14-14.18.1-6.18.2.ppc64le", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-6.18.2.ppc64le", product: { name: "nodejs14-devel-14.18.1-6.18.2.ppc64le", product_id: "nodejs14-devel-14.18.1-6.18.2.ppc64le", }, }, { category: "product_version", name: "npm14-14.18.1-6.18.2.ppc64le", product: { name: "npm14-14.18.1-6.18.2.ppc64le", product_id: "npm14-14.18.1-6.18.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-6.18.2.s390x", product: { name: "nodejs14-14.18.1-6.18.2.s390x", product_id: "nodejs14-14.18.1-6.18.2.s390x", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-6.18.2.s390x", product: { name: "nodejs14-devel-14.18.1-6.18.2.s390x", product_id: "nodejs14-devel-14.18.1-6.18.2.s390x", }, }, { category: "product_version", name: "npm14-14.18.1-6.18.2.s390x", product: { name: "npm14-14.18.1-6.18.2.s390x", product_id: "npm14-14.18.1-6.18.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs14-14.18.1-6.18.2.x86_64", product: { name: "nodejs14-14.18.1-6.18.2.x86_64", product_id: "nodejs14-14.18.1-6.18.2.x86_64", }, }, { category: "product_version", name: "nodejs14-devel-14.18.1-6.18.2.x86_64", product: { name: "nodejs14-devel-14.18.1-6.18.2.x86_64", product_id: "nodejs14-devel-14.18.1-6.18.2.x86_64", }, }, { category: "product_version", name: "npm14-14.18.1-6.18.2.x86_64", product: { name: "npm14-14.18.1-6.18.2.x86_64", product_id: "npm14-14.18.1-6.18.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 12", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-6.18.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", }, product_reference: "nodejs14-14.18.1-6.18.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-6.18.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", }, product_reference: "nodejs14-14.18.1-6.18.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-6.18.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", }, product_reference: "nodejs14-14.18.1-6.18.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-14.18.1-6.18.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", }, product_reference: "nodejs14-14.18.1-6.18.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-6.18.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", }, product_reference: "nodejs14-devel-14.18.1-6.18.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-6.18.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", }, product_reference: "nodejs14-devel-14.18.1-6.18.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-6.18.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", }, product_reference: "nodejs14-devel-14.18.1-6.18.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-devel-14.18.1-6.18.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", }, product_reference: "nodejs14-devel-14.18.1-6.18.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs14-docs-14.18.1-6.18.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", }, product_reference: "nodejs14-docs-14.18.1-6.18.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-6.18.2.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", }, product_reference: "npm14-14.18.1-6.18.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-6.18.2.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", }, product_reference: "npm14-14.18.1-6.18.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-6.18.2.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", }, product_reference: "npm14-14.18.1-6.18.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm14-14.18.1-6.18.2.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", }, product_reference: "npm14-14.18.1-6.18.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-devel-14.18.1-6.18.2.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs14-docs-14.18.1-6.18.2.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm14-14.18.1-6.18.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-12-02T12:51:24Z", details: "important", }, ], title: "CVE-2021-39135", }, ], }
suse-su-2022:0101-1
Vulnerability from csaf_suse
Published
2022-01-18 08:35
Modified
2022-01-18 08:35
Summary
Security update for nodejs12
Notes
Title of the patch
Security update for nodejs12
Description of the patch
This update for nodejs12 fixes the following issues:
- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).
- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).
- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).
- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).
- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers(bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite vulnerability in nodejs-tar (bsc#1190057).
- CVE-2021-37712: Fixed arbitrary file creation and overwrite vulnerability in nodejs-tar (bsc#1190056).
- CVE-2021-37713: Fixed arbitrary file creation/overwrite and arbitrary code execution vulnerability in nodejs-tar (bsc#1190055).
- CVE-2021-39134: Fixed symlink following vulnerability in nodejs-arborist (bsc#1190054).
- CVE-2021-39135: Fixed symlink following vulnerability in nodejs-arborist (bsc#1190053).
Patchnames
SUSE-2022-101,SUSE-SLE-Module-Web-Scripting-12-2022-101
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for nodejs12", title: "Title of the patch", }, { category: "description", text: "This update for nodejs12 fixes the following issues:\n\n- CVE-2021-44531: Fixed improper handling of URI Subject Alternative Names (bsc#1194511).\n- CVE-2021-44532: Fixed certificate Verification Bypass via String Injection (bsc#1194512).\n- CVE-2021-44533: Fixed incorrect handling of certificate subject and issuer fields (bsc#1194513).\n- CVE-2022-21824: Fixed prototype pollution via console.table properties (bsc#1194514).\n- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers(bsc#1191601).\n- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).\n- CVE-2021-37701: Fixed arbitrary file creation and overwrite vulnerability in nodejs-tar (bsc#1190057).\n- CVE-2021-37712: Fixed arbitrary file creation and overwrite vulnerability in nodejs-tar (bsc#1190056).\n- CVE-2021-37713: Fixed arbitrary file creation/overwrite and arbitrary code execution vulnerability in nodejs-tar (bsc#1190055).\n- CVE-2021-39134: Fixed symlink following vulnerability in nodejs-arborist (bsc#1190054).\n- CVE-2021-39135: Fixed symlink following vulnerability in nodejs-arborist (bsc#1190053).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-101,SUSE-SLE-Module-Web-Scripting-12-2022-101", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0101-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0101-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220101-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0101-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html", }, { category: "self", summary: "SUSE Bug 1190053", url: "https://bugzilla.suse.com/1190053", }, { category: "self", summary: "SUSE Bug 1190054", url: "https://bugzilla.suse.com/1190054", }, { category: "self", summary: "SUSE Bug 1190055", url: "https://bugzilla.suse.com/1190055", }, { category: "self", summary: "SUSE Bug 1190056", url: "https://bugzilla.suse.com/1190056", }, { category: "self", summary: "SUSE Bug 1190057", url: "https://bugzilla.suse.com/1190057", }, { category: "self", summary: "SUSE Bug 1191601", url: "https://bugzilla.suse.com/1191601", }, { category: "self", summary: "SUSE Bug 1191602", url: "https://bugzilla.suse.com/1191602", }, { category: "self", summary: "SUSE Bug 1194511", url: "https://bugzilla.suse.com/1194511", }, { category: "self", summary: "SUSE Bug 1194512", url: "https://bugzilla.suse.com/1194512", }, { category: "self", summary: "SUSE Bug 1194513", url: "https://bugzilla.suse.com/1194513", }, { category: "self", summary: "SUSE Bug 1194514", url: "https://bugzilla.suse.com/1194514", }, { category: "self", summary: "SUSE CVE CVE-2021-22959 page", url: "https://www.suse.com/security/cve/CVE-2021-22959/", }, { category: "self", summary: "SUSE CVE CVE-2021-22960 page", url: "https://www.suse.com/security/cve/CVE-2021-22960/", }, { category: "self", summary: "SUSE CVE CVE-2021-37701 page", url: "https://www.suse.com/security/cve/CVE-2021-37701/", }, { category: "self", summary: "SUSE CVE CVE-2021-37712 page", url: "https://www.suse.com/security/cve/CVE-2021-37712/", }, { category: "self", summary: "SUSE CVE CVE-2021-37713 page", url: "https://www.suse.com/security/cve/CVE-2021-37713/", }, { category: "self", summary: "SUSE CVE CVE-2021-39134 page", url: "https://www.suse.com/security/cve/CVE-2021-39134/", }, { category: "self", summary: "SUSE CVE CVE-2021-39135 page", url: "https://www.suse.com/security/cve/CVE-2021-39135/", }, { category: "self", summary: "SUSE CVE CVE-2021-44531 page", url: "https://www.suse.com/security/cve/CVE-2021-44531/", }, { category: "self", summary: "SUSE CVE CVE-2021-44532 page", url: "https://www.suse.com/security/cve/CVE-2021-44532/", }, { category: "self", summary: "SUSE CVE CVE-2021-44533 page", url: "https://www.suse.com/security/cve/CVE-2021-44533/", }, { category: "self", summary: "SUSE CVE CVE-2022-21824 page", url: "https://www.suse.com/security/cve/CVE-2022-21824/", }, ], title: "Security update for nodejs12", tracking: { current_release_date: "2022-01-18T08:35:56Z", generator: { date: "2022-01-18T08:35:56Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0101-1", initial_release_date: "2022-01-18T08:35:56Z", revision_history: [ { date: "2022-01-18T08:35:56Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "nodejs12-12.22.9-1.38.1.aarch64", product: { name: "nodejs12-12.22.9-1.38.1.aarch64", product_id: "nodejs12-12.22.9-1.38.1.aarch64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.9-1.38.1.aarch64", product: { name: "nodejs12-devel-12.22.9-1.38.1.aarch64", product_id: "nodejs12-devel-12.22.9-1.38.1.aarch64", }, }, { category: "product_version", name: "npm12-12.22.9-1.38.1.aarch64", product: { name: "npm12-12.22.9-1.38.1.aarch64", product_id: "npm12-12.22.9-1.38.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.9-1.38.1.i586", product: { name: "nodejs12-12.22.9-1.38.1.i586", product_id: "nodejs12-12.22.9-1.38.1.i586", }, }, { category: "product_version", name: "nodejs12-devel-12.22.9-1.38.1.i586", product: { name: "nodejs12-devel-12.22.9-1.38.1.i586", product_id: "nodejs12-devel-12.22.9-1.38.1.i586", }, }, { category: "product_version", name: "npm12-12.22.9-1.38.1.i586", product: { name: "npm12-12.22.9-1.38.1.i586", product_id: "npm12-12.22.9-1.38.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "nodejs12-docs-12.22.9-1.38.1.noarch", product: { name: "nodejs12-docs-12.22.9-1.38.1.noarch", product_id: "nodejs12-docs-12.22.9-1.38.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.9-1.38.1.ppc64le", product: { name: "nodejs12-12.22.9-1.38.1.ppc64le", product_id: "nodejs12-12.22.9-1.38.1.ppc64le", }, }, { category: "product_version", name: "nodejs12-devel-12.22.9-1.38.1.ppc64le", product: { name: "nodejs12-devel-12.22.9-1.38.1.ppc64le", product_id: "nodejs12-devel-12.22.9-1.38.1.ppc64le", }, }, { category: "product_version", name: "npm12-12.22.9-1.38.1.ppc64le", product: { name: "npm12-12.22.9-1.38.1.ppc64le", product_id: "npm12-12.22.9-1.38.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.9-1.38.1.s390x", product: { name: "nodejs12-12.22.9-1.38.1.s390x", product_id: "nodejs12-12.22.9-1.38.1.s390x", }, }, { category: "product_version", name: "nodejs12-devel-12.22.9-1.38.1.s390x", product: { name: "nodejs12-devel-12.22.9-1.38.1.s390x", product_id: "nodejs12-devel-12.22.9-1.38.1.s390x", }, }, { category: "product_version", name: "npm12-12.22.9-1.38.1.s390x", product: { name: "npm12-12.22.9-1.38.1.s390x", product_id: "npm12-12.22.9-1.38.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "nodejs12-12.22.9-1.38.1.x86_64", product: { name: "nodejs12-12.22.9-1.38.1.x86_64", product_id: "nodejs12-12.22.9-1.38.1.x86_64", }, }, { category: "product_version", name: "nodejs12-devel-12.22.9-1.38.1.x86_64", product: { name: "nodejs12-devel-12.22.9-1.38.1.x86_64", product_id: "nodejs12-devel-12.22.9-1.38.1.x86_64", }, }, { category: "product_version", name: "npm12-12.22.9-1.38.1.x86_64", product: { name: "npm12-12.22.9-1.38.1.x86_64", product_id: "npm12-12.22.9-1.38.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 12", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.9-1.38.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", }, product_reference: "nodejs12-12.22.9-1.38.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.9-1.38.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", }, product_reference: "nodejs12-12.22.9-1.38.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.9-1.38.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", }, product_reference: "nodejs12-12.22.9-1.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-12.22.9-1.38.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", }, product_reference: "nodejs12-12.22.9-1.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.9-1.38.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", }, product_reference: "nodejs12-devel-12.22.9-1.38.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.9-1.38.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", }, product_reference: "nodejs12-devel-12.22.9-1.38.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.9-1.38.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", }, product_reference: "nodejs12-devel-12.22.9-1.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-devel-12.22.9-1.38.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", }, product_reference: "nodejs12-devel-12.22.9-1.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "nodejs12-docs-12.22.9-1.38.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", }, product_reference: "nodejs12-docs-12.22.9-1.38.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.9-1.38.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", }, product_reference: "npm12-12.22.9-1.38.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.9-1.38.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", }, product_reference: "npm12-12.22.9-1.38.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.9-1.38.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", }, product_reference: "npm12-12.22.9-1.38.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, { category: "default_component_of", full_product_name: { name: "npm12-12.22.9-1.38.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", product_id: "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", }, product_reference: "npm12-12.22.9-1.38.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 12", }, ], }, vulnerabilities: [ { cve: "CVE-2021-22959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22959", }, ], notes: [ { category: "general", text: "The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22959", url: "https://www.suse.com/security/cve/CVE-2021-22959", }, { category: "external", summary: "SUSE Bug 1191601 for CVE-2021-22959", url: "https://bugzilla.suse.com/1191601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "moderate", }, ], title: "CVE-2021-22959", }, { cve: "CVE-2021-22960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22960", }, ], notes: [ { category: "general", text: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22960", url: "https://www.suse.com/security/cve/CVE-2021-22960", }, { category: "external", summary: "SUSE Bug 1191602 for CVE-2021-22960", url: "https://bugzilla.suse.com/1191602", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "moderate", }, ], title: "CVE-2021-22960", }, { cve: "CVE-2021-37701", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37701", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\\` and `/` characters as path separators, however `\\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37701", url: "https://www.suse.com/security/cve/CVE-2021-37701", }, { category: "external", summary: "SUSE Bug 1190057 for CVE-2021-37701", url: "https://bugzilla.suse.com/1190057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "important", }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37712", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37712", url: "https://www.suse.com/security/cve/CVE-2021-37712", }, { category: "external", summary: "SUSE Bug 1190056 for CVE-2021-37712", url: "https://bugzilla.suse.com/1190056", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "important", }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37713", }, ], notes: [ { category: "general", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\\path`. If the drive letter does not match the extraction target, for example `D:\\extraction\\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37713", url: "https://www.suse.com/security/cve/CVE-2021-37713", }, { category: "external", summary: "SUSE Bug 1190055 for CVE-2021-37713", url: "https://bugzilla.suse.com/1190055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "important", }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39134", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `\"foo\": \"file:/some/path\"`. Another package, `pwn-b` could define a dependency such as `FOO: \"file:foo.tgz\"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39134", url: "https://www.suse.com/security/cve/CVE-2021-39134", }, { category: "external", summary: "SUSE Bug 1190054 for CVE-2021-39134", url: "https://bugzilla.suse.com/1190054", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "important", }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39135", }, ], notes: [ { category: "general", text: "`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39135", url: "https://www.suse.com/security/cve/CVE-2021-39135", }, { category: "external", summary: "SUSE Bug 1190053 for CVE-2021-39135", url: "https://bugzilla.suse.com/1190053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "important", }, ], title: "CVE-2021-39135", }, { cve: "CVE-2021-44531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44531", }, ], notes: [ { category: "general", text: "Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44531", url: "https://www.suse.com/security/cve/CVE-2021-44531", }, { category: "external", summary: "SUSE Bug 1194511 for CVE-2021-44531", url: "https://bugzilla.suse.com/1194511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "moderate", }, ], title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44532", }, ], notes: [ { category: "general", text: "Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44532", url: "https://www.suse.com/security/cve/CVE-2021-44532", }, { category: "external", summary: "SUSE Bug 1194512 for CVE-2021-44532", url: "https://bugzilla.suse.com/1194512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "moderate", }, ], title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44533", }, ], notes: [ { category: "general", text: "Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44533", url: "https://www.suse.com/security/cve/CVE-2021-44533", }, { category: "external", summary: "SUSE Bug 1194513 for CVE-2021-44533", url: "https://bugzilla.suse.com/1194513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "moderate", }, ], title: "CVE-2021-44533", }, { cve: "CVE-2022-21824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-21824", }, ], notes: [ { category: "general", text: "Due to the formatting logic of the \"console.table()\" function it was not safe to allow user controlled input to be passed to the \"properties\" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be \"__proto__\". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-21824", url: "https://www.suse.com/security/cve/CVE-2022-21824", }, { category: "external", summary: "SUSE Bug 1194514 for CVE-2022-21824", url: "https://bugzilla.suse.com/1194514", }, { category: "external", summary: "SUSE Bug 1202688 for CVE-2022-21824", url: "https://bugzilla.suse.com/1202688", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.22.9-1.38.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.22.9-1.38.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.22.9-1.38.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-01-18T08:35:56Z", details: "low", }, ], title: "CVE-2022-21824", }, ], }
gsd-2021-22960
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-22960", description: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", id: "GSD-2021-22960", references: [ "https://www.suse.com/security/cve/CVE-2021-22960.html", "https://access.redhat.com/errata/RHSA-2022:0350", "https://access.redhat.com/errata/RHSA-2022:0246", "https://access.redhat.com/errata/RHSA-2022:0041", "https://access.redhat.com/errata/RHSA-2021:5171", "https://advisories.mageia.org/CVE-2021-22960.html", "https://security.archlinux.org/CVE-2021-22960", "https://linux.oracle.com/cve/CVE-2021-22960.html", "https://access.redhat.com/errata/RHSA-2022:4914", "https://www.debian.org/security/2022/dsa-5170", "https://access.redhat.com/errata/RHEA-2022:4925", "https://access.redhat.com/errata/RHEA-2022:5139", "https://access.redhat.com/errata/RHEA-2022:5221", "https://access.redhat.com/errata/RHEA-2022:5615", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-22960", ], details: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", id: "GSD-2021-22960", modified: "2023-12-13T01:23:24.448880Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "support@hackerone.com", ID: "CVE-2021-22960", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "https://github.com/nodejs/llhttp", version: { version_data: [ { version_value: "Fixed in v2.1.4 and v6.0.6", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "HTTP Request Smuggling (CWE-444)", }, ], }, ], }, references: { reference_data: [ { name: "https://hackerone.com/reports/1238099", refsource: "MISC", url: "https://hackerone.com/reports/1238099", }, { name: "https://www.oracle.com/security-alerts/cpujan2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { name: "DSA-5170", refsource: "DEBIAN", url: "https://www.debian.org/security/2022/dsa-5170", }, ], }, }, "gitlab.com": { advisories: [ { affected_range: "<2.1.4||>=3.0.0 <6.0.6", affected_versions: "All versions before 2.1.4, all versions starting from 3.0.0 before 6.0.6", cvss_v2: "AV:N/AC:M/Au:N/C:P/I:P/A:N", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", cwe_ids: [ "CWE-1035", "CWE-444", "CWE-937", ], date: "2023-01-20", description: "The parse function in llhttp ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", fixed_versions: [], identifier: "CVE-2021-22960", identifiers: [ "CVE-2021-22960", ], not_impacted: "", package_slug: "npm/llhttp", pubdate: "2021-11-03", solution: "Unfortunately, there is no solution available yet.", title: "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", "https://hackerone.com/reports/1238099", ], uuid: "34872515-f6ad-424c-87ac-e27dc70a16c3", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*", cpe_name: [], versionEndExcluding: "2.1.4", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:*", cpe_name: [], versionEndExcluding: "6.0.6", versionStartIncluding: "3.0.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve-assignments@hackerone.com", ID: "CVE-2021-22960", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-444", }, ], }, ], }, references: { reference_data: [ { name: "https://hackerone.com/reports/1238099", refsource: "MISC", tags: [ "Exploit", "Issue Tracking", "Third Party Advisory", ], url: "https://hackerone.com/reports/1238099", }, { name: "https://www.oracle.com/security-alerts/cpujan2022.html", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { name: "DSA-5170", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5170", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, }, }, lastModifiedDate: "2023-01-20T02:04Z", publishedDate: "2021-11-03T20:15Z", }, }, }
ghsa-px8h-5r3g-hj68
Vulnerability from github
Published
2022-05-24 19:19
Modified
2022-05-24 19:19
Severity ?
Details
The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
{ affected: [], aliases: [ "CVE-2021-22960", ], database_specific: { cwe_ids: [ "CWE-444", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-11-03T20:15:00Z", severity: "MODERATE", }, details: "The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", id: "GHSA-px8h-5r3g-hj68", modified: "2022-05-24T19:19:31Z", published: "2022-05-24T19:19:31Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", }, { type: "WEB", url: "https://hackerone.com/reports/1238099", }, { type: "WEB", url: "https://www.debian.org/security/2022/dsa-5170", }, { type: "WEB", url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.