Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-8172
Vulnerability from cvelistv5
Published
2020-06-08 13:08
Modified
2024-08-04 09:56
Severity ?
EPSS score ?
Summary
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | https://github.com/nodejs/node |
Version: 12.18.0,14.4.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:26.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/811502" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "GLSA-202101-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/nodejs/node", "vendor": "n/a", "versions": [ { "status": "affected", "version": "12.18.0,14.4.0" } ] } ], "descriptions": [ { "lang": "en", "value": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation (CAPEC-233)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:23:19", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/811502" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "GLSA-202101-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/nodejs/node", "version": { "version_data": [ { "version_value": "12.18.0,14.4.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation (CAPEC-233)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://hackerone.com/reports/811502", "refsource": "MISC", "url": "https://hackerone.com/reports/811502" }, { "name": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200625-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "GLSA-202101-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8172", "datePublished": "2020-06-08T13:08:16", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:26.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-8172\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2020-06-08T14:15:13.213\",\"lastModified\":\"2024-11-21T05:38:26.007\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.\"},{\"lang\":\"es\",\"value\":\"La reutilizaci\u00f3n de una sesi\u00f3n TLS puede conllevar a una omisi\u00f3n de la verificaci\u00f3n del certificado del host en node versi\u00f3n anterior a 12.18.0 y anterior a 14.4.0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.18.0\",\"matchCriteriaId\":\"9D494880-6066-460B-B384-B9188C3967FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndExcluding\":\"14.4.0\",\"matchCriteriaId\":\"89511E55-5D62-425E-B1A3-0688FACEB53C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EABAFD73-150F-4DFE-B721-29EB4475D979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE57039D-E2EE-4014-A7B1-D7380D26098E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.2\",\"matchCriteriaId\":\"D0DBC938-A782-433F-8BF1-CA250C332AA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"909B4029-1D4F-4D60-AC6D-98C7E9FF1B15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B501426C-7FB5-4C0D-83E4-0279746EFBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.3.30\",\"matchCriteriaId\":\"69D21CF6-A2D7-403B-9A22-66A892C0F57D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.0\",\"versionEndIncluding\":\"7.4.29\",\"matchCriteriaId\":\"156E63C9-9834-4120-A245-CF1AF6BEC040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.5.0\",\"versionEndIncluding\":\"7.5.19\",\"matchCriteriaId\":\"6111894E-B3C9-41F1-8106-6BA16980A146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.6.0\",\"versionEndIncluding\":\"7.6.15\",\"matchCriteriaId\":\"C69D247E-D8A3-4834-9240-7EACCA0F63BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.21\",\"matchCriteriaId\":\"88B86B2E-D69E-4E1E-BCD5-8B3B9573626C\"}]}]}],\"references\":[{\"url\":\"https://hackerone.com/reports/811502\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202101-07\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200625-0002/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/811502\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202101-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200625-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
WID-SEC-W-2023-1374
Vulnerability from csaf_certbund
Published
2020-06-07 22:00
Modified
2023-10-23 22:00
Summary
Node.js: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Programmcode auszuführen, einen Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1374 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2023-1374.json" }, { "category": "self", "summary": "WID-SEC-2023-1374 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3563-2 vom 2023-10-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6380-1 vom 2023-09-19", "url": "https://ubuntu.com/security/notices/USN-6380-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6142-1 vom 2023-06-06", "url": "https://ubuntu.com/security/notices/USN-6142-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0930-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0932-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0931-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" }, { "category": "external", "summary": "Node.js June 2020 Security Releases vom 2020-06-07", "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "category": "external", "summary": "Debian Security Advisory DSA-4696-1 vom 2020-06-06", "url": "https://www.debian.org/security/2020/dsa-4696" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1568-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1575-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1576-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2524 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2524" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2523 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2523" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1623-1 vom 2020-06-16", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2755 vom 2020-06-25", "url": "https://access.redhat.com/errata/RHSA-2020:2755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2784 vom 2020-07-01", "url": "https://access.redhat.com/errata/RHSA-2020:2784" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2850 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2850" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2823 vom 2020-07-06", "url": "https://access.redhat.com/errata/RHSA-2020:2823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2849 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2849" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2848 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2848" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2847 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2852 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:0819-2 vom 2020-07-08", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2895 vom 2020-07-13", "url": "https://access.redhat.com/errata/RHSA-2020:2895" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3042 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:3042" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3084 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:3084" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28", "url": "https://access.redhat.com/errata/RHSA-2020:3194" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3372 vom 2020-08-06", "url": "https://access.redhat.com/errata/RHSA-2020:3372" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3525 vom 2020-08-19", "url": "https://access.redhat.com/errata/RHSA-2020:3525" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3578 vom 2020-09-08", "url": "https://access.redhat.com/errata/RHSA-2020:3578" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1109-1 vom 2021-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2800-1 vom 2020-09-30", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-07 vom 2021-01-11", "url": "https://security.gentoo.org/glsa/202101-07" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0548 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0548.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0551 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0551.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0744 vom 2021-03-09", "url": "https://linux.oracle.com/errata/ELSA-2021-0744.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2786 vom 2021-10-17", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-23T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:29:57.959+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1374", "initial_release_date": "2020-06-07T22:00:00.000+00:00", "revision_history": [ { "date": "2020-06-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-01T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-06T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-07-12T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-19T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-30T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-10T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2021-02-21T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-09T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-24T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-17T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-06-05T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-09-18T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-23T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "25" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Open Source Node.js \u003c 10.21.0", "product": { "name": "Open Source Node.js \u003c 10.21.0", "product_id": "T016681", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:10.21.0" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 12.18.0", "product": { "name": "Open Source Node.js \u003c 12.18.0", "product_id": "T016682", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:12.18.0" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 14.4.0", "product": { "name": "Open Source Node.js \u003c 14.4.0", "product_id": "T016683", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:14.4.0" } } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10531", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie befindet sich in den \"International Components for Unicode (ICU) for C/C++\" und beruht auf einem Puffer \u00dcberlauffehler. Ein Angreifer kann dieses nutzen und Code mit den Privilegien des Angegriffenen zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstelle ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-10531" }, { "cve": "CVE-2020-11080", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht auf einem Fehler bei der Verarbeitung \u00fcberlanger HTTP/2 SETTINGS Frames. Ein Angreifer kann dieses zu einem Denial of Service Angriff nutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-11080" }, { "cve": "CVE-2020-8172", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht darauf, dass ein \"session\" Event vor einem \"secureConnect\" Event versendet werden kann. Der Application Agent betreibt ein HTTPS Session Caching. Ein Angreifer kann dieses nutzen, eine unautorisierte Verbindung aufbauen und so Sicherheitsmechanismen umgehen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-8172" }, { "cve": "CVE-2020-8174", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht auf Fehlern bei der Pr\u00fcfung von Bereichsgrenzen. Ein Angreifer kann dieses durch \u00dcbermittlung geeignet gestalteter Daten nutzen und erh\u00f6hte Privilegien erlangen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-8174" } ] }
wid-sec-w-2023-1374
Vulnerability from csaf_certbund
Published
2020-06-07 22:00
Modified
2023-10-23 22:00
Summary
Node.js: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Programmcode auszuführen, einen Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1374 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2023-1374.json" }, { "category": "self", "summary": "WID-SEC-2023-1374 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3563-2 vom 2023-10-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6380-1 vom 2023-09-19", "url": "https://ubuntu.com/security/notices/USN-6380-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6142-1 vom 2023-06-06", "url": "https://ubuntu.com/security/notices/USN-6142-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0930-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0932-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0931-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" }, { "category": "external", "summary": "Node.js June 2020 Security Releases vom 2020-06-07", "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "category": "external", "summary": "Debian Security Advisory DSA-4696-1 vom 2020-06-06", "url": "https://www.debian.org/security/2020/dsa-4696" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1568-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1575-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1576-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2524 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2524" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2523 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2523" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1623-1 vom 2020-06-16", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2755 vom 2020-06-25", "url": "https://access.redhat.com/errata/RHSA-2020:2755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2784 vom 2020-07-01", "url": "https://access.redhat.com/errata/RHSA-2020:2784" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2850 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2850" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2823 vom 2020-07-06", "url": "https://access.redhat.com/errata/RHSA-2020:2823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2849 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2849" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2848 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2848" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2847 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2852 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:0819-2 vom 2020-07-08", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2895 vom 2020-07-13", "url": "https://access.redhat.com/errata/RHSA-2020:2895" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3042 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:3042" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3084 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:3084" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28", "url": "https://access.redhat.com/errata/RHSA-2020:3194" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3372 vom 2020-08-06", "url": "https://access.redhat.com/errata/RHSA-2020:3372" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3525 vom 2020-08-19", "url": "https://access.redhat.com/errata/RHSA-2020:3525" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3578 vom 2020-09-08", "url": "https://access.redhat.com/errata/RHSA-2020:3578" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1109-1 vom 2021-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2800-1 vom 2020-09-30", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-07 vom 2021-01-11", "url": "https://security.gentoo.org/glsa/202101-07" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0548 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0548.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0551 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0551.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0744 vom 2021-03-09", "url": "https://linux.oracle.com/errata/ELSA-2021-0744.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2786 vom 2021-10-17", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-23T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:29:57.959+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1374", "initial_release_date": "2020-06-07T22:00:00.000+00:00", "revision_history": [ { "date": "2020-06-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-01T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-06T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-07-12T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-19T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-30T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-10T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2021-02-21T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-09T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-24T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-17T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-06-05T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-09-18T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-23T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "25" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Open Source Node.js \u003c 10.21.0", "product": { "name": "Open Source Node.js \u003c 10.21.0", "product_id": "T016681", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:10.21.0" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 12.18.0", "product": { "name": "Open Source Node.js \u003c 12.18.0", "product_id": "T016682", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:12.18.0" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 14.4.0", "product": { "name": "Open Source Node.js \u003c 14.4.0", "product_id": "T016683", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:14.4.0" } } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10531", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie befindet sich in den \"International Components for Unicode (ICU) for C/C++\" und beruht auf einem Puffer \u00dcberlauffehler. Ein Angreifer kann dieses nutzen und Code mit den Privilegien des Angegriffenen zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstelle ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-10531" }, { "cve": "CVE-2020-11080", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht auf einem Fehler bei der Verarbeitung \u00fcberlanger HTTP/2 SETTINGS Frames. Ein Angreifer kann dieses zu einem Denial of Service Angriff nutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-11080" }, { "cve": "CVE-2020-8172", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht darauf, dass ein \"session\" Event vor einem \"secureConnect\" Event versendet werden kann. Der Application Agent betreibt ein HTTPS Session Caching. Ein Angreifer kann dieses nutzen, eine unautorisierte Verbindung aufbauen und so Sicherheitsmechanismen umgehen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-8172" }, { "cve": "CVE-2020-8174", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht auf Fehlern bei der Pr\u00fcfung von Bereichsgrenzen. Ein Angreifer kann dieses durch \u00dcbermittlung geeignet gestalteter Daten nutzen und erh\u00f6hte Privilegien erlangen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-8174" } ] }
rhsa-2020_2852
Vulnerability from csaf_redhat
Published
2020-07-07 17:48
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.2).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.18.2).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2852", "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2852.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-24T20:21:29+00:00", "generator": { "date": "2024-11-24T20:21:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2852", "initial_release_date": "2020-07-07T17:48:05+00:00", "revision_history": [ { "date": "2020-07-07T17:48:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T17:48:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8020020200630155331:4cda2c84", "product": { "name": "nodejs:12:8020020200630155331:4cda2c84", "product_id": "nodejs:12:8020020200630155331:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8020020200630155331:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "product": { "name": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "product_id": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, "product_reference": "nodejs:12:8020020200630155331:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch" }, "product_reference": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845247" } ], "notes": [ { "category": "description", "text": "A TLS Hostname verification bypass vulnerability exists in NodeJS. This flaw allows an attacker to bypass TLS Hostname verification when a TLS client reuses HTTPS sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: TLS session reuse can lead to hostname verification bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects the TLS 1.2 protocol, not TLS 1.3. This issue does not affect NodeJS 10.\n\nRed Hat Quay installed NodeJS as a dependency of Yarn. It does not use NodeJS at runtime, but executes Javascript on the client\u0027s browser instead. Therefore the impact of this vulnerability on Red Hat Quay is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8172" }, { "category": "external", "summary": "RHBZ#1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8172", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: TLS session reuse can lead to hostname verification bypass" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2895
Vulnerability from csaf_redhat
Published
2020-07-13 10:51
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.18.2).
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.18.2).\n\nSecurity Fix(es):\n\n* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2895", "url": "https://access.redhat.com/errata/RHSA-2020:2895" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1807349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807349" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2895.json" } ], "title": "Red Hat Security Advisory: rh-nodejs12-nodejs security update", "tracking": { "current_release_date": "2024-11-24T20:21:35+00:00", "generator": { "date": "2024-11-24T20:21:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2895", "initial_release_date": "2020-07-13T10:51:06+00:00", "revision_history": [ { "date": "2020-07-13T10:51:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-13T10:51:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.18.2-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845247" } ], "notes": [ { "category": "description", "text": "A TLS Hostname verification bypass vulnerability exists in NodeJS. This flaw allows an attacker to bypass TLS Hostname verification when a TLS client reuses HTTPS sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: TLS session reuse can lead to hostname verification bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects the TLS 1.2 protocol, not TLS 1.3. This issue does not affect NodeJS 10.\n\nRed Hat Quay installed NodeJS as a dependency of Yarn. It does not use NodeJS at runtime, but executes Javascript on the client\u0027s browser instead. Therefore the impact of this vulnerability on Red Hat Quay is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8172" }, { "category": "external", "summary": "RHBZ#1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8172", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: TLS session reuse can lead to hostname verification bypass" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2020-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807349" } ], "notes": [ { "category": "description", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Integer overflow in UnicodeString::doAppend()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10531" }, { "category": "external", "summary": "RHBZ#1807349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807349" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10531", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html", "url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html" } ], "release_date": "2020-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ICU: Integer overflow in UnicodeString::doAppend()" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2847
Vulnerability from csaf_redhat
Published
2020-07-07 09:14
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.2).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.18.2).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2847", "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2847.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-24T20:21:22+00:00", "generator": { "date": "2024-11-24T20:21:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2847", "initial_release_date": "2020-07-07T09:14:43+00:00", "revision_history": [ { "date": "2020-07-07T09:14:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T09:14:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8010020200630154708:c27ad7f8", "product": { "name": "nodejs:12:8010020200630154708:c27ad7f8", "product_id": "nodejs:12:8010020200630154708:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8010020200630154708:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "product": { "name": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "product_id": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, "product_reference": "nodejs:12:8010020200630154708:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch" }, "product_reference": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845247" } ], "notes": [ { "category": "description", "text": "A TLS Hostname verification bypass vulnerability exists in NodeJS. This flaw allows an attacker to bypass TLS Hostname verification when a TLS client reuses HTTPS sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: TLS session reuse can lead to hostname verification bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects the TLS 1.2 protocol, not TLS 1.3. This issue does not affect NodeJS 10.\n\nRed Hat Quay installed NodeJS as a dependency of Yarn. It does not use NodeJS at runtime, but executes Javascript on the client\u0027s browser instead. Therefore the impact of this vulnerability on Red Hat Quay is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8172" }, { "category": "external", "summary": "RHBZ#1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8172", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: TLS session reuse can lead to hostname verification bypass" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
ghsa-98vx-jqrx-7mq2
Vulnerability from github
Published
2022-05-24 17:19
Modified
2022-05-24 17:19
Severity ?
Details
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
{ "affected": [], "aliases": [ "CVE-2020-8172" ], "database_specific": { "cwe_ids": [ "CWE-295" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-06-08T14:15:00Z", "severity": "MODERATE" }, "details": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.", "id": "GHSA-98vx-jqrx-7mq2", "modified": "2022-05-24T17:19:34Z", "published": "2022-05-24T17:19:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" }, { "type": "WEB", "url": "https://hackerone.com/reports/811502" }, { "type": "WEB", "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-07" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200625-0002" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
icsa-22-111-03
Vulnerability from csaf_cisa
Published
2022-04-21 00:00
Modified
2022-04-21 00:00
Summary
Hitachi Energy MicroSCADA Pro/X SYS600
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.
Critical infrastructure sectors
Energy
Countries/areas deployed
Worldwide
Company headquarters location
Switzerland
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-111-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-111-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-111-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-111-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy MicroSCADA Pro/X SYS600", "tracking": { "current_release_date": "2022-04-21T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-111-03", "initial_release_date": "2022-04-21T00:00:00.000000Z", "revision_history": [ { "date": "2022-04-21T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-111-03 Hitachi Energy MicroSCADA ProX SYS600" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 10.1.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": " SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=9.4 FP1 | \u003e= 10.2.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": " SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 10.0.0 | \u003c= 10.2.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": " SYS600" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1968", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. This would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note this vulnerability only impacts DH ciphersuites and not ECDH ciphersuites. This vulnerability affects OpenSSL 1.0.2, which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1968" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling.CVE-2020-8265 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling.CVE-2020-8287 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8201", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js \u003c 12.18.4 and \u003c 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack is possible due to a bug in processing of carrier-return symbols in the HTTP header names.CVE-2020-8201 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8201" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8252", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The implementation of realpath in libuv \u003c 10.22.1, \u003c 12.18.4, and \u003c 14.9.0 used within Node.js incorrectly determined the buffer size, which can result in a buffer overflow if the resolved path is longer than 256 bytes.CVE-2020-8252 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8252" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.CVE-2020-8172 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8172" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "napi_get_value_string_*() allows various kinds of memory corruption in node \u003c 10.21.0, 12.18.0, and \u003c 14.4.0.CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8174" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2021-32027", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in postgresql in versions prior to 13.3, 12.7, 11.12, 10.17, and 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32027" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2021-32028", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32028" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
ICSA-22-111-03
Vulnerability from csaf_cisa
Published
2022-04-21 00:00
Modified
2022-04-21 00:00
Summary
Hitachi Energy MicroSCADA Pro/X SYS600
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.
Critical infrastructure sectors
Energy
Countries/areas deployed
Worldwide
Company headquarters location
Switzerland
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to eavesdrop on traffic between network source and destination, gain unauthorized access to information, or cause a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-111-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-111-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-111-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-111-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy MicroSCADA Pro/X SYS600", "tracking": { "current_release_date": "2022-04-21T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-111-03", "initial_release_date": "2022-04-21T00:00:00.000000Z", "revision_history": [ { "date": "2022-04-21T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-111-03 Hitachi Energy MicroSCADA ProX SYS600" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 10.1.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": " SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=9.4 FP1 | \u003e= 10.2.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": " SYS600" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 10.0.0 | \u003c= 10.2.1", "product": { "name": " SYS600: Versions 10.1.1 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": " SYS600" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1968", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The Raccoon attack exploits a flaw in the TLS specification that can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. This would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note this vulnerability only impacts DH ciphersuites and not ECDH ciphersuites. This vulnerability affects OpenSSL 1.0.2, which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).CVE-2020-1968 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1968" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling.CVE-2020-8265 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions prior to 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two transfer-encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP request smuggling.CVE-2020-8287 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8201", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js \u003c 12.18.4 and \u003c 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack is possible due to a bug in processing of carrier-return symbols in the HTTP header names.CVE-2020-8201 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8201" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8252", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The implementation of realpath in libuv \u003c 10.22.1, \u003c 12.18.4, and \u003c 14.9.0 used within Node.js incorrectly determined the buffer size, which can result in a buffer overflow if the resolved path is longer than 256 bytes.CVE-2020-8252 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8252" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.CVE-2020-8172 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8172" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "napi_get_value_string_*() allows various kinds of memory corruption in node \u003c 10.21.0, 12.18.0, and \u003c 14.4.0.CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8174" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2021-32027", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in postgresql in versions prior to 13.3, 12.7, 11.12, 10.17, and 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.CVE-2021-32027 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32027" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2021-32028", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.CVE-2021-32028 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32028" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to Versions 10.3 or later. For obtaining the update users should contact the Hitachi Energy technical support team. If users don\u0027t know who to contact, they should reach the closest Hitachi Energy sales office.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "Hitachi Energy recommends security practices and firewall configurations to help protect process control networks from attacks that originate from outside the network. Such practices include physically protecting process control systems from direct access by unauthorized personnel, having no direct connections to the Internet, separating from other networks by means of a firewall system that has a minimal number of ports exposed, and others that must be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "mitigation", "details": "For more information see Hitachi Energy advisory 8DBD000075", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000075\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
gsd-2020-8172
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-8172", "description": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.", "id": "GSD-2020-8172", "references": [ "https://www.suse.com/security/cve/CVE-2020-8172.html", "https://access.redhat.com/errata/RHSA-2020:2895", "https://access.redhat.com/errata/RHSA-2020:2852", "https://access.redhat.com/errata/RHSA-2020:2847", "https://linux.oracle.com/cve/CVE-2020-8172.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-8172" ], "details": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0.", "id": "GSD-2020-8172", "modified": "2023-12-13T01:21:54.142386Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/nodejs/node", "version": { "version_data": [ { "version_value": "12.18.0,14.4.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation (CAPEC-233)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://hackerone.com/reports/811502", "refsource": "MISC", "url": "https://hackerone.com/reports/811502" }, { "name": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200625-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "GLSA-202101-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.18.0", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.4.0", "versionStartIncluding": "14.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.21", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.6.15", "versionStartIncluding": "7.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.5.19", "versionStartIncluding": "7.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.4.29", "versionStartIncluding": "7.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3.30", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.1.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve-assignments@hackerone.com", "ID": "CVE-2020-8172" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "TLS session reuse can lead to host certificate verification bypass in node version \u003c 12.18.0 and \u003c 14.4.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/811502", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/811502" }, { "name": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "name": "https://security.netapp.com/advisory/ntap-20200625-0002/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "GLSA-202101-07", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2 } }, "lastModifiedDate": "2022-05-12T15:01Z", "publishedDate": "2020-06-08T14:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.