Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-18869 (GCVE-0-2017-18869)
Vulnerability from cvelistv5 – Published: 2020-06-15 14:33 – Updated: 2024-08-05 21:37
VLAI?
EPSS
Summary
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T21:37:44.315Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-06-15T14:33:51",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18869",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/isaacs/chownr/issues/14",
"refsource": "MISC",
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"name": "https://snyk.io/vuln/npm:chownr:20180731",
"refsource": "MISC",
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-18869",
"datePublished": "2020-06-15T14:33:51",
"dateReserved": "2020-06-15T00:00:00",
"dateUpdated": "2024-08-05T21:37:44.315Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-18869\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-06-15T15:15:09.317\",\"lastModified\":\"2024-11-21T03:21:08.307\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.\"},{\"lang\":\"es\",\"value\":\"Un problema de tipo TOCTOU en el paquete chownr versiones anteriores a 1.1.0 para Node.js versi\u00f3n 10.10, podr\u00eda permitir a un atacante local enga\u00f1arlo para que descienda a directorios no deseados mediante ataques de tipo symlink\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":2.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chownr_project:chownr:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"1.1.0\",\"matchCriteriaId\":\"BA4EAB96-893F-489C-B2A1-C677624250D6\"}]}]}],\"references\":[{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1611614\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://github.com/isaacs/chownr/issues/14\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/npm:chownr:20180731\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1611614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://github.com/isaacs/chownr/issues/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/npm:chownr:20180731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
GHSA-C6RQ-RJC2-86V2
Vulnerability from github – Published: 2022-02-10 23:33 – Updated: 2021-05-12 20:23
VLAI?
Summary
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
Details
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "chownr"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-18869"
],
"database_specific": {
"cwe_ids": [
"CWE-367"
],
"github_reviewed": true,
"github_reviewed_at": "2021-05-12T20:23:29Z",
"nvd_published_at": "2020-06-15T15:15:00Z",
"severity": "LOW"
},
"details": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.",
"id": "GHSA-c6rq-rjc2-86v2",
"modified": "2021-05-12T20:23:29Z",
"published": "2022-02-10T23:33:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18869"
},
{
"type": "WEB",
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"type": "WEB",
"url": "https://github.com/isaacs/chownr/commit/36a93e3f0a220062c47b237cf6ab6d5f55cd79c9"
},
{
"type": "WEB",
"url": "https://github.com/isaacs/chownr/commit/a631d841022880e5c8d694408a7e96d6d576d0ce"
},
{
"type": "WEB",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Time-of-check Time-of-use (TOCTOU) Race Condition in chownr"
}
RHSA-2020:2625
Vulnerability from csaf_redhat - Published: 2020-06-19 03:46 - Updated: 2026-01-08 10:18Summary
Red Hat Security Advisory: rh-nodejs8-nodejs security update
Notes
Topic
An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.17.0). (BZ#1829414)
Security Fix(es):
* nodejs-brace-expansion: Regular expression denial of service (CVE-2017-18077)
* nodejs-chownr: TOCTOU vulnerability in `chownr` function in chownr.js (CVE-2017-18869)
* nodejs-sshpk: ReDoS when parsing crafted invalid public keys in lib/formats/ssh.js (CVE-2018-3737)
* nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties (CVE-2018-3750)
* npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775)
* npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776)
* npm: Global node_modules Binary Overwrite (CVE-2019-16777)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.17.0). (BZ#1829414)\n\nSecurity Fix(es):\n\n* nodejs-brace-expansion: Regular expression denial of service (CVE-2017-18077)\n\n* nodejs-chownr: TOCTOU vulnerability in `chownr` function in chownr.js (CVE-2017-18869)\n\n* nodejs-sshpk: ReDoS when parsing crafted invalid public keys in lib/formats/ssh.js (CVE-2018-3737)\n\n* nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties (CVE-2018-3750)\n\n* npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775)\n\n* npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776)\n\n* npm: Global node_modules Binary Overwrite (CVE-2019-16777)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:2625",
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1448380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448380"
},
{
"category": "external",
"summary": "1567228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567228"
},
{
"category": "external",
"summary": "1578246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578246"
},
{
"category": "external",
"summary": "1611613",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611613"
},
{
"category": "external",
"summary": "1788301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788301"
},
{
"category": "external",
"summary": "1788305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788305"
},
{
"category": "external",
"summary": "1788310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788310"
},
{
"category": "external",
"summary": "1829414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829414"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2625.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update",
"tracking": {
"current_release_date": "2026-01-08T10:18:51+00:00",
"generator": {
"date": "2026-01-08T10:18:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2020:2625",
"initial_release_date": "2020-06-19T03:46:11+00:00",
"revision_history": [
{
"date": "2020-06-19T03:46:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-06-19T03:46:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T10:18:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"product": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"product_id": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.17.0-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"product": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"product_id": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.17.0-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"product": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"product_id": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.13.4-8.17.0.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"product": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"product_id": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.17.0-2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"product": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"product_id": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.17.0-2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"product": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"product_id": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.17.0-2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"product": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"product_id": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.13.4-8.17.0.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"product": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"product_id": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.17.0-2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"product": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"product_id": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.17.0-2.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"product": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"product_id": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.17.0-2.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"product": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"product_id": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.13.4-8.17.0.2.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"product": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"product_id": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.17.0-2.el7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"product": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"product_id": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.17.0-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"product": {
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"product_id": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-docs@8.17.0-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"product": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"product_id": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.17.0-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"product": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"product_id": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.17.0-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"product": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"product_id": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.13.4-8.17.0.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"product": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"product_id": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.17.0-2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch"
},
"product_reference": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch"
},
"product_reference": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch"
},
"product_reference": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch"
},
"product_reference": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64"
},
"product_reference": "rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch"
},
"product_reference": "rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
},
"product_reference": "rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18077",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1448380"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-brace-expansion: Regular expression denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay include brace-explansion as a build time dependency. It\u0027s not used at runtime and hence has a reduce impact of low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18077"
},
{
"category": "external",
"summary": "RHBZ#1448380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448380"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18077"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-brace-expansion: Regular expression denial of service"
},
{
"cve": "CVE-2017-18869",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2018-07-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1611613"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-chownr: TOCTOU vulnerability in `chownr` function in chownr.js",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18869"
},
{
"category": "external",
"summary": "RHBZ#1611613",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611613"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18869",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18869"
}
],
"release_date": "2018-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-chownr: TOCTOU vulnerability in `chownr` function in chownr.js"
},
{
"cve": "CVE-2018-3737",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567228"
}
],
"notes": [
{
"category": "description",
"text": "sshpk is vulnerable to ReDoS when parsing crafted invalid public keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-sshpk: ReDoS when parsing crafted invalid public keys in lib/formats/ssh.js",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Quay includes sshpk as a dependency of protractor which is only used during a build. The sshpk dependency is not used at runtime therefore this vulnerability has a low impact for Red Hat Quay.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3737"
},
{
"category": "external",
"summary": "RHBZ#1567228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3737"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3737",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3737"
}
],
"release_date": "2018-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-sshpk: ReDoS when parsing crafted invalid public keys in lib/formats/ssh.js"
},
{
"cve": "CVE-2018-3750",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1578246"
}
],
"notes": [
{
"category": "description",
"text": "The utilities function in all versions \u003c= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3750"
},
{
"category": "external",
"summary": "RHBZ#1578246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3750"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/311333",
"url": "https://hackerone.com/reports/311333"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/612",
"url": "https://nodesecurity.io/advisories/612"
}
],
"release_date": "2018-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-deep-extend: Prototype pollution can allow attackers to modify object properties"
},
{
"cve": "CVE-2019-16775",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1788305"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: Symlink reference outside of node_modules folder through the bin field upon installation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16775"
},
{
"category": "external",
"summary": "RHBZ#1788305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16775"
}
],
"release_date": "2019-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "npm: Symlink reference outside of node_modules folder through the bin field upon installation"
},
{
"cve": "CVE-2019-16776",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1788310"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user\u0027s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: Arbitrary file write via constructed entry in the package.json bin field",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16776"
},
{
"category": "external",
"summary": "RHBZ#1788310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16776"
}
],
"release_date": "2019-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "npm: Arbitrary file write via constructed entry in the package.json bin field"
},
{
"cve": "CVE-2019-16777",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1788301"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: Global node_modules Binary Overwrite",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16777"
},
{
"category": "external",
"summary": "RHBZ#1788301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788301"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16777"
}
],
"release_date": "2019-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-06-19T03:46:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:2625"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-debuginfo-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-devel-0:8.17.0-2.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs8-nodejs-docs-0:8.17.0-2.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs8-npm-0:6.13.4-8.17.0.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "npm: Global node_modules Binary Overwrite"
}
]
}
FKIE_CVE-2017-18869
Vulnerability from fkie_nvd - Published: 2020-06-15 15:15 - Updated: 2024-11-21 03:21
Severity ?
Summary
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985 | Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1611614 | Permissions Required | |
| cve@mitre.org | https://github.com/isaacs/chownr/issues/14 | Third Party Advisory | |
| cve@mitre.org | https://snyk.io/vuln/npm:chownr:20180731 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1611614 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/isaacs/chownr/issues/14 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/npm:chownr:20180731 | Exploit, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| chownr_project | chownr | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chownr_project:chownr:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BA4EAB96-893F-489C-B2A1-C677624250D6",
"versionEndExcluding": "1.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks."
},
{
"lang": "es",
"value": "Un problema de tipo TOCTOU en el paquete chownr versiones anteriores a 1.1.0 para Node.js versi\u00f3n 10.10, podr\u00eda permitir a un atacante local enga\u00f1arlo para que descienda a directorios no deseados mediante ataques de tipo symlink"
}
],
"id": "CVE-2017-18869",
"lastModified": "2024-11-21T03:21:08.307",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-15T15:15:09.317",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/npm:chownr:20180731"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2021-25694
Vulnerability from cnvd - Published: 2021-04-08
VLAI Severity ?
Title
chownr package竞争条件问题漏洞
Description
Joyent Node.js是美国Joyent公司的一套建立在Google V8 JavaScript引擎之上的网络应用平台。该平台主要用于构建高度可伸缩的应用程序,以及编写能够处理数万条且同时连接到一个物理机的连接代码。chownr package是其中的一个文件所有权管理软件包。
chownr package 1.1.0之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。目前没有详细的漏洞细节提供。
Severity
低
Patch Name
chownr package竞争条件问题漏洞的补丁
Patch Description
Joyent Node.js是美国Joyent公司的一套建立在Google V8 JavaScript引擎之上的网络应用平台。该平台主要用于构建高度可伸缩的应用程序,以及编写能够处理数万条且同时连接到一个物理机的连接代码。chownr package是其中的一个文件所有权管理软件包。
chownr package 1.1.0之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。目前没有详细的漏洞细节提供。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/isaacs/chownr/issues/14
Reference
https://nvd.nist.gov/vuln/detail/CVE-2017-18869
Impacted products
| Name | chownr chownr <1.1.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-18869"
}
},
"description": "Joyent Node.js\u662f\u7f8e\u56fdJoyent\u516c\u53f8\u7684\u4e00\u5957\u5efa\u7acb\u5728Google V8 JavaScript\u5f15\u64ce\u4e4b\u4e0a\u7684\u7f51\u7edc\u5e94\u7528\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u4e3b\u8981\u7528\u4e8e\u6784\u5efa\u9ad8\u5ea6\u53ef\u4f38\u7f29\u7684\u5e94\u7528\u7a0b\u5e8f\uff0c\u4ee5\u53ca\u7f16\u5199\u80fd\u591f\u5904\u7406\u6570\u4e07\u6761\u4e14\u540c\u65f6\u8fde\u63a5\u5230\u4e00\u4e2a\u7269\u7406\u673a\u7684\u8fde\u63a5\u4ee3\u7801\u3002chownr package\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u6587\u4ef6\u6240\u6709\u6743\u7ba1\u7406\u8f6f\u4ef6\u5305\u3002\n\nchownr package 1.1.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u95ee\u9898\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u8fd0\u884c\u8fc7\u7a0b\u4e2d\uff0c\u5e76\u53d1\u4ee3\u7801\u9700\u8981\u4e92\u65a5\u5730\u8bbf\u95ee\u5171\u4eab\u8d44\u6e90\u65f6\uff0c\u5bf9\u4e8e\u5e76\u53d1\u8bbf\u95ee\u7684\u5904\u7406\u4e0d\u5f53\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/isaacs/chownr/issues/14",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-25694",
"openTime": "2021-04-08",
"patchDescription": "Joyent Node.js\u662f\u7f8e\u56fdJoyent\u516c\u53f8\u7684\u4e00\u5957\u5efa\u7acb\u5728Google V8 JavaScript\u5f15\u64ce\u4e4b\u4e0a\u7684\u7f51\u7edc\u5e94\u7528\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u4e3b\u8981\u7528\u4e8e\u6784\u5efa\u9ad8\u5ea6\u53ef\u4f38\u7f29\u7684\u5e94\u7528\u7a0b\u5e8f\uff0c\u4ee5\u53ca\u7f16\u5199\u80fd\u591f\u5904\u7406\u6570\u4e07\u6761\u4e14\u540c\u65f6\u8fde\u63a5\u5230\u4e00\u4e2a\u7269\u7406\u673a\u7684\u8fde\u63a5\u4ee3\u7801\u3002chownr package\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u6587\u4ef6\u6240\u6709\u6743\u7ba1\u7406\u8f6f\u4ef6\u5305\u3002\r\n\r\nchownr package 1.1.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u95ee\u9898\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u8fd0\u884c\u8fc7\u7a0b\u4e2d\uff0c\u5e76\u53d1\u4ee3\u7801\u9700\u8981\u4e92\u65a5\u5730\u8bbf\u95ee\u5171\u4eab\u8d44\u6e90\u65f6\uff0c\u5bf9\u4e8e\u5e76\u53d1\u8bbf\u95ee\u7684\u5904\u7406\u4e0d\u5f53\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002 \u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "chownr package\u7ade\u4e89\u6761\u4ef6\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "chownr chownr \u003c1.1.0"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-18869",
"serverity": "\u4f4e",
"submitTime": "2020-06-16",
"title": "chownr package\u7ade\u4e89\u6761\u4ef6\u95ee\u9898\u6f0f\u6d1e"
}
GSD-2017-18869
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-18869",
"description": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.",
"id": "GSD-2017-18869",
"references": [
"https://access.redhat.com/errata/RHSA-2020:2625",
"https://advisories.mageia.org/CVE-2017-18869.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-18869"
],
"details": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.",
"id": "GSD-2017-18869",
"modified": "2023-12-13T01:21:10.536189Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18869",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/isaacs/chownr/issues/14",
"refsource": "MISC",
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"name": "https://snyk.io/vuln/npm:chownr:20180731",
"refsource": "MISC",
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c1.1.0",
"affected_versions": "All versions before 1.1.0",
"cvss_v2": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-367",
"CWE-937"
],
"date": "2020-06-17",
"description": "A TOCTOU issue in the chownr package for `Node.js` could allow a local attacker to trick it into descending into unintended directories via symlink attacks.",
"fixed_versions": [
"1.1.0"
],
"identifier": "CVE-2017-18869",
"identifiers": [
"CVE-2017-18869"
],
"not_impacted": "All versions starting from 1.1.0",
"package_slug": "npm/chownr",
"pubdate": "2020-06-15",
"solution": "Upgrade to version 1.1.0 or above.",
"title": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-18869"
],
"uuid": "cc4ad09e-5ba2-4e30-81e6-3703cf3609a0"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:chownr_project:chownr:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18869"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/isaacs/chownr/issues/14",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/isaacs/chownr/issues/14"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614",
"refsource": "MISC",
"tags": [
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"name": "https://snyk.io/vuln/npm:chownr:20180731",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/npm:chownr:20180731"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
},
"lastModifiedDate": "2020-06-17T19:51Z",
"publishedDate": "2020-06-15T15:15Z"
}
}
}
CERTFR-2024-AVI-1103
Vulnerability from certfr_avis - Published: 2024-12-20 - Updated: 2024-12-20
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 |
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2023-41334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2024-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2018-14042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2018-17100",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-34266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
},
{
"name": "CVE-2020-35521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2018-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2019-6128",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2024-45082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-4759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
},
{
"name": "CVE-2017-11613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2024-41752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
},
{
"name": "CVE-2023-50447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
},
{
"name": "CVE-2018-18508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2014-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
},
{
"name": "CVE-2023-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
},
{
"name": "CVE-2018-20676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-17007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2023-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
},
{
"name": "CVE-2018-20677",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2015-7182",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2018-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2020-19144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2017-12627",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
},
{
"name": "CVE-2018-17101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2020-26261",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
},
{
"name": "CVE-2023-24816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2019-17546",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2020-15110",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2021-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2017-18869",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2022-0891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
},
{
"name": "CVE-2018-7456",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
},
{
"name": "CVE-2023-38288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2017-18013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2016-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
},
{
"name": "CVE-2017-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2024-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2019-14973",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
},
{
"name": "CVE-2020-36191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2018-14041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2020-19131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
},
{
"name": "CVE-2015-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2018-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
},
{
"name": "CVE-2018-17000",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2020-35523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2024-34102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2021-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2024-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
},
{
"name": "CVE-2024-25016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-29896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
},
{
"name": "CVE-2015-7181",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
},
{
"name": "CVE-2020-18768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2017-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
},
{
"name": "CVE-2014-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2017-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2017-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2018-19210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
},
{
"name": "CVE-2013-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2019-10255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2020-35524",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2020-35522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2017-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
}
],
"initial_release_date": "2024-12-20T00:00:00",
"last_revision_date": "2024-12-20T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1103",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
"url": "https://www.ibm.com/support/pages/node/7177142"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
"url": "https://www.ibm.com/support/pages/node/7177223"
},
{
"published_at": "2024-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
"url": "https://www.ibm.com/support/pages/node/7179044"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
"url": "https://www.ibm.com/support/pages/node/7179156"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
"url": "https://www.ibm.com/support/pages/node/7179166"
},
{
"published_at": "2024-12-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
"url": "https://www.ibm.com/support/pages/node/7178835"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…