Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-8116 (GCVE-0-2020-8116)
Vulnerability from cvelistv5 – Published: 2020-02-04 19:08 – Updated: 2024-08-04 09:48- CWE-471 - Modification of Assumed-Immutable Data (MAID) (CWE-471)
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:48:25.632Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://hackerone.com/reports/719856"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "dot-prop",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before 4.2.1"
},
{
"status": "affected",
"version": "5.x before 5.1.1"
},
{
"status": "affected",
"version": "Fixed in 5.1.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-471",
"description": "Modification of Assumed-Immutable Data (MAID) (CWE-471)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-10T14:12:12",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://hackerone.com/reports/719856"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"ID": "CVE-2020-8116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "dot-prop",
"version": {
"version_data": [
{
"version_value": "before 4.2.1"
},
{
"version_value": "5.x before 5.1.1"
},
{
"version_value": "Fixed in 5.1.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Modification of Assumed-Immutable Data (MAID) (CWE-471)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/719856",
"refsource": "MISC",
"url": "https://hackerone.com/reports/719856"
},
{
"name": "https://github.com/sindresorhus/dot-prop/tree/v4",
"refsource": "MISC",
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"name": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm",
"refsource": "MISC",
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"name": "https://github.com/sindresorhus/dot-prop/issues/63",
"refsource": "MISC",
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2020-8116",
"datePublished": "2020-02-04T19:08:57",
"dateReserved": "2020-01-28T00:00:00",
"dateUpdated": "2024-08-04T09:48:25.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-8116\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2020-02-04T20:15:13.353\",\"lastModified\":\"2024-11-21T05:38:19.580\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de contaminaci\u00f3n de prototipo en el paquete dot-prop npm en versiones anteriores a 4.2.1 y versiones 5.x anteriores a 5.1.1, permite a un atacante agregar propiedades arbitrarias en las construcciones del lenguaje JavaScript, tales como objetos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-471\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1321\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"4.2.1\",\"matchCriteriaId\":\"9EFF2C93-F28E-47DE-A654-0B614FB1D5B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.1.1\",\"matchCriteriaId\":\"F8DD28C3-2237-4DD4-AAB4-455A93029B51\"}]}]}],\"references\":[{\"url\":\"https://github.com/advisories/GHSA-ff7x-qrg7-qggm\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/sindresorhus/dot-prop/issues/63\",\"source\":\"support@hackerone.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sindresorhus/dot-prop/tree/v4\",\"source\":\"support@hackerone.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/719856\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/advisories/GHSA-ff7x-qrg7-qggm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/sindresorhus/dot-prop/issues/63\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sindresorhus/dot-prop/tree/v4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hackerone.com/reports/719856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
RHSA-2021:0521
Vulnerability from csaf_redhat - Published: 2021-02-15 18:28 - Updated: 2026-01-06 00:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.23.1).\n\nSecurity Fix(es):\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* npm: sensitive information exposure through logs (CVE-2020-15095)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0521",
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1840004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004"
},
{
"category": "external",
"summary": "1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "1857977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977"
},
{
"category": "external",
"summary": "1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "1892430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430"
},
{
"category": "external",
"summary": "1898680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680"
},
{
"category": "external",
"summary": "1907444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444"
},
{
"category": "external",
"summary": "1912854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854"
},
{
"category": "external",
"summary": "1912863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0521.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update",
"tracking": {
"current_release_date": "2026-01-06T00:54:19+00:00",
"generator": {
"date": "2026-01-06T00:54:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2021:0521",
"initial_release_date": "2021-02-15T18:28:29+00:00",
"revision_history": [
{
"date": "2021-02-15T18:28:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-15T18:28:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T00:54:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"product": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"product": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"product": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"product_id": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.23.1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"product": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"product_id": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.10-10.23.1.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"product": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"product_id": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.23.1-2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"product": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"product": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"product_id": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.23.1-2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"product": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"product_id": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.10-10.23.1.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"product": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"product_id": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.23.1-2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"product": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"product_id": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.23.1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"product": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"product_id": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.23.1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"product": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"product_id": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.10-10.23.1.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"product": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"product_id": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.23.1-2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"product": {
"name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"product_id": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.23.1-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch"
},
"product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch"
},
"product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch"
},
"product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64"
},
"product_reference": "rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch"
},
"product_reference": "rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
},
"product_reference": "rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7608",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2020-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1840004"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in nodesjs-yargs-parser, where it can be tricked into adding or modifying properties of the Object.prototype using a \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-yargs-parser: prototype pollution vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7608"
},
{
"category": "external",
"summary": "RHBZ#1840004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7608"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608"
}
],
"release_date": "2020-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-yargs-parser: prototype pollution vulnerability"
},
{
"cve": "CVE-2020-7754",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1892430"
}
],
"notes": [
{
"category": "description",
"text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7754"
},
{
"category": "external",
"summary": "RHBZ#1892430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754"
},
{
"category": "external",
"summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p",
"url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"
}
],
"release_date": "2020-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS"
},
{
"cve": "CVE-2020-7774",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1898680"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-y18n: prototype pollution vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "RHBZ#1898680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887",
"url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-y18n: prototype pollution vulnerability"
},
{
"cve": "CVE-2020-7788",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1907444"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-ini: Prototype pollution via malicious INI file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7788"
},
{
"category": "external",
"summary": "RHBZ#1907444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-ini: Prototype pollution via malicious INI file"
},
{
"cve": "CVE-2020-8116",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868196"
}
],
"notes": [
{
"category": "description",
"text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-dot-prop: prototype pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8116"
},
{
"category": "external",
"summary": "RHBZ#1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/719856",
"url": "https://hackerone.com/reports/719856"
}
],
"release_date": "2020-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-dot-prop: prototype pollution"
},
{
"cve": "CVE-2020-8252",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879315"
}
],
"notes": [
{
"category": "description",
"text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libuv: buffer overflow in realpath",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8252"
},
{
"category": "external",
"summary": "RHBZ#1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libuv: buffer overflow in realpath"
},
{
"cve": "CVE-2020-8265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912854"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: use-after-free in the TLS implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8265"
},
{
"category": "external",
"summary": "RHBZ#1912854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/988103",
"url": "https://hackerone.com/reports/988103"
}
],
"release_date": "2021-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: use-after-free in the TLS implementation"
},
{
"cve": "CVE-2020-8287",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: HTTP request smuggling via two copies of a header field in an http request",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8287"
},
{
"category": "external",
"summary": "RHBZ#1912863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287"
}
],
"release_date": "2021-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: HTTP request smuggling via two copies of a header field in an http request"
},
{
"cve": "CVE-2020-15095",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856875"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: sensitive information exposure through logs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15095"
},
{
"category": "external",
"summary": "RHBZ#1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095"
}
],
"release_date": "2020-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
},
{
"category": "workaround",
"details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "npm: sensitive information exposure through logs"
},
{
"cve": "CVE-2020-15366",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1857977"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-ajv library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15366"
},
{
"category": "external",
"summary": "RHBZ#1857977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908",
"url": "https://snyk.io/vuln/SNYK-JS-AJV-584908"
}
],
"release_date": "2020-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-15T18:28:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0521"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.src",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.23.1-2.el7.x86_64",
"7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.23.1-2.el7.noarch",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.ppc64le",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.s390x",
"7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.10-10.23.1.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function"
}
]
}
RHSA-2021:0548
Vulnerability from csaf_redhat - Published: 2021-02-16 14:25 - Updated: 2026-01-06 00:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.23.1).\n\nSecurity Fix(es):\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* npm: sensitive information exposure through logs (CVE-2020-15095)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0548",
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1840004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004"
},
{
"category": "external",
"summary": "1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "1857977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977"
},
{
"category": "external",
"summary": "1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "1892430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430"
},
{
"category": "external",
"summary": "1898680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680"
},
{
"category": "external",
"summary": "1907444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444"
},
{
"category": "external",
"summary": "1912854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854"
},
{
"category": "external",
"summary": "1912863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0548.json"
}
],
"title": "Red Hat Security Advisory: nodejs:10 security update",
"tracking": {
"current_release_date": "2026-01-06T00:54:19+00:00",
"generator": {
"date": "2026-01-06T00:54:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2021:0548",
"initial_release_date": "2021-02-16T14:25:46+00:00",
"revision_history": [
{
"date": "2021-02-16T14:25:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-16T14:25:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T00:54:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10)",
"product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10)",
"product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10)",
"product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10)",
"product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10)",
"product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10)",
"product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"product": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src (nodejs:10)",
"product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=src\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"product": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src (nodejs:10)",
"product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"product": {
"name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src (nodejs:10)",
"product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"product": {
"name": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch (nodejs:10)",
"product_id": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"product": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch (nodejs:10)",
"product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"product": {
"name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch (nodejs:10)",
"product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10)",
"product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10)",
"product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10)",
"product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10)",
"product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10)",
"product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10)",
"product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10)",
"product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10)",
"product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10)",
"product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10)",
"product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10)",
"product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10)",
"product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10)",
"product_id": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10)",
"product_id": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10)",
"product_id": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10)",
"product_id": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10)",
"product_id": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@10.23.1-1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10)",
"product_id": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.10-1.10.23.1.1.module%2Bel8.3.0%2B9502%2B012d8a97?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:10:8030020210118191659:229f0a1c"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10"
},
"product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10"
},
"product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10"
},
"product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10"
},
"product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
},
"product_reference": "nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10"
},
"product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10"
},
"product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10"
},
"product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
},
"product_reference": "nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10"
},
"product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10"
},
"product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10"
},
"product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
},
"product_reference": "nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10"
},
"product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10"
},
"product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10"
},
"product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
},
"product_reference": "nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10"
},
"product_reference": "nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10"
},
"product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10"
},
"product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10"
},
"product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
},
"product_reference": "nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10"
},
"product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10"
},
"product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10"
},
"product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10"
},
"product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10"
},
"product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10"
},
"product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10"
},
"product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64 (nodejs:10) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
},
"product_reference": "npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"relates_to_product_reference": "AppStream-8.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-7608",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2020-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1840004"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in nodesjs-yargs-parser, where it can be tricked into adding or modifying properties of the Object.prototype using a \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-yargs-parser: prototype pollution vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7608"
},
{
"category": "external",
"summary": "RHBZ#1840004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7608"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7608"
}
],
"release_date": "2020-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-yargs-parser: prototype pollution vulnerability"
},
{
"cve": "CVE-2020-7754",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1892430"
}
],
"notes": [
{
"category": "description",
"text": "This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Enterprise Linux 8 and Software Collections, `npm-user-validate` is used exclusively for `npm`. As a result, this vulnerability is considered Low in such a context.\n\nIn OpenShift Container Platform (OCP) 3.11 and 4.4 the kibana package has been marked Low (similar to RHEL8) as it is primarily used for npm and is protected via OpenShift OAuth. Additionally, whilst OCP 4.4 does deliver the kibana package, due to the code changing to container first content, it has been marked as wontfix at this time and may be fixed in a future release. \n\nAdditionally, the openshift4/ose-logging-kibana6 container is not represented on the CVE page as it gets npm from the Red Hat Software Collections and as such the ose-logging-kibana6 container will be updated when the rh-nodejs10-nodejs package is.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7754"
},
{
"category": "external",
"summary": "RHBZ#1892430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892430"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7754"
},
{
"category": "external",
"summary": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p",
"url": "https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p"
}
],
"release_date": "2020-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS"
},
{
"cve": "CVE-2020-7774",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1898680"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-y18n: prototype pollution vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-y18n library to authenticated users only, therefore the impact is Low.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of y18n as a dependency of yargs. However, no unsafe usage found where the module accepts untrusted input and hence this issue has been rated as having a security impact of Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7774"
},
{
"category": "external",
"summary": "RHBZ#1898680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887",
"url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-y18n: prototype pollution vulnerability"
},
{
"cve": "CVE-2020-7788",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1907444"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-ini: Prototype pollution via malicious INI file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7788"
},
{
"category": "external",
"summary": "RHBZ#1907444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-ini: Prototype pollution via malicious INI file"
},
{
"cve": "CVE-2020-8116",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868196"
}
],
"notes": [
{
"category": "description",
"text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-dot-prop: prototype pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8116"
},
{
"category": "external",
"summary": "RHBZ#1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/719856",
"url": "https://hackerone.com/reports/719856"
}
],
"release_date": "2020-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-dot-prop: prototype pollution"
},
{
"cve": "CVE-2020-8252",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879315"
}
],
"notes": [
{
"category": "description",
"text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libuv: buffer overflow in realpath",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8252"
},
{
"category": "external",
"summary": "RHBZ#1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libuv: buffer overflow in realpath"
},
{
"cve": "CVE-2020-8265",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912854"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: use-after-free in the TLS implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8265"
},
{
"category": "external",
"summary": "RHBZ#1912854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/988103",
"url": "https://hackerone.com/reports/988103"
}
],
"release_date": "2021-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: use-after-free in the TLS implementation"
},
{
"cve": "CVE-2020-8287",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs. Affected versions of Node.js allow two copies of a header field in an HTTP request. The first header field is recognized while the second is ignored leading to HTTP request smuggling. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: HTTP request smuggling via two copies of a header field in an http request",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8287"
},
{
"category": "external",
"summary": "RHBZ#1912863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287"
}
],
"release_date": "2021-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs: HTTP request smuggling via two copies of a header field in an http request"
},
{
"cve": "CVE-2020-15095",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856875"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: sensitive information exposure through logs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15095"
},
{
"category": "external",
"summary": "RHBZ#1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095"
}
],
"release_date": "2020-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
},
{
"category": "workaround",
"details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "npm: sensitive information exposure through logs"
},
{
"cve": "CVE-2020-15366",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1857977"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-ajv library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15366"
},
{
"category": "external",
"summary": "RHBZ#1857977",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908",
"url": "https://snyk.io/vuln/SNYK-JS-AJV-584908"
}
],
"release_date": "2020-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-16T14:25:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0548"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debuginfo-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-debugsource-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-devel-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-docs-1:10.23.1-1.module+el8.3.0+9502+012d8a97.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-full-i18n-1:10.23.1-1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch::nodejs:10",
"AppStream-8.3.0.Z.MAIN:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.aarch64::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.ppc64le::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.s390x::nodejs:10",
"AppStream-8.3.0.Z.MAIN:npm-1:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97.x86_64::nodejs:10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function"
}
]
}
RHSA-2020:4903
Vulnerability from csaf_redhat - Published: 2020-11-04 12:35 - Updated: 2026-01-06 00:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.18.4).\n\nSecurity Fix(es):\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)\n\n* npm: Sensitive information exposure through logs (CVE-2020-15095)\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The nodejs:12/development module is not installable (BZ#1883965)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4903",
"url": "https://access.redhat.com/errata/RHSA-2020:4903"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "1879311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311"
},
{
"category": "external",
"summary": "1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "1883965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883965"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4903.json"
}
],
"title": "Red Hat Security Advisory: nodejs:12 security and bug fix update",
"tracking": {
"current_release_date": "2026-01-06T00:54:17+00:00",
"generator": {
"date": "2026-01-06T00:54:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2020:4903",
"initial_release_date": "2020-11-04T12:35:47+00:00",
"revision_history": [
{
"date": "2020-11-04T12:35:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-04T12:35:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T00:54:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=src\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src (nodejs:12)",
"product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src (nodejs:12)",
"product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.1.0%2B8360%2B14141500?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"product": {
"name": "nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch (nodejs:12)",
"product_id": "nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12)",
"product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12)",
"product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.1.0%2B8360%2B14141500?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.1.0%2B8360%2B14141500?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.1.0%2B8360%2B14141500?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.1.0%2B8360%2B14141500?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8010020201006223055:c27ad7f8"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12"
},
"product_reference": "nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12"
},
"product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12"
},
"product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12"
},
"product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12"
},
"product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8116",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868196"
}
],
"notes": [
{
"category": "description",
"text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-dot-prop: prototype pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8116"
},
{
"category": "external",
"summary": "RHBZ#1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/719856",
"url": "https://hackerone.com/reports/719856"
}
],
"release_date": "2020-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-04T12:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4903"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-dot-prop: prototype pollution"
},
{
"cve": "CVE-2020-8201",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879311"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js, where affected Node.js versions converted carriage returns in HTTP request headers to a hyphen before parsing. This flaw leads to HTTP Request Smuggling as it is a non-standard interpretation of the header. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: HTTP request smuggling due to CR-to-Hyphen conversion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Node.js is included in Red Hat Quay as a dependency of Yarn, which is only used while building Red Hat Quay, and not during runtime.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8201"
},
{
"category": "external",
"summary": "RHBZ#1879311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8201",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8201"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-04T12:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4903"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: HTTP request smuggling due to CR-to-Hyphen conversion"
},
{
"cve": "CVE-2020-8252",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879315"
}
],
"notes": [
{
"category": "description",
"text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libuv: buffer overflow in realpath",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8252"
},
{
"category": "external",
"summary": "RHBZ#1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-04T12:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4903"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libuv: buffer overflow in realpath"
},
{
"cve": "CVE-2020-15095",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856875"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: sensitive information exposure through logs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15095"
},
{
"category": "external",
"summary": "RHBZ#1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095"
}
],
"release_date": "2020-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-04T12:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4903"
},
{
"category": "workaround",
"details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.",
"product_ids": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-devel-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-docs-1:12.18.4-2.module+el8.1.0+8360+14141500.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.1.0+8360+14141500.x86_64::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.1.0.Z.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.aarch64::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.ppc64le::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.s390x::nodejs:12",
"AppStream-8.1.0.Z.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.1.0+8360+14141500.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "npm: sensitive information exposure through logs"
}
]
}
RHSA-2020:5086
Vulnerability from csaf_redhat - Published: 2020-11-12 09:44 - Updated: 2026-01-06 00:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.18.4). (BZ#1878550, BZ#1888291, BZ#1888298)\n\nSecurity Fix(es):\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)\n\n* npm: Sensitive information exposure through logs (CVE-2020-15095)\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5086",
"url": "https://access.redhat.com/errata/RHSA-2020:5086"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "1879311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311"
},
{
"category": "external",
"summary": "1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5086.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs12-nodejs security update",
"tracking": {
"current_release_date": "2026-01-06T00:54:17+00:00",
"generator": {
"date": "2026-01-06T00:54:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2020:5086",
"initial_release_date": "2020-11-12T09:44:59+00:00",
"revision_history": [
{
"date": "2020-11-12T09:44:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-12T09:44:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T00:54:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"product": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"product_id": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"product": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"product_id": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.4-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"product": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"product_id": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.6-12.18.4.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"product": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.4-3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"product": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"product_id": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"product": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"product_id": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.4-3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"product": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"product_id": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.6-12.18.4.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"product": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.4-3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"product": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"product_id": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"product": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"product_id": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.4-3.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"product": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"product_id": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.6-12.18.4.3.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"product": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.4-3.el7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"product": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"product_id": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"product": {
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"product_id": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.18.4-3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"product": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"product_id": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"product": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"product_id": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.4-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"product": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"product_id": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.6-12.18.4.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"product": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.4-3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch"
},
"product_reference": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch"
},
"product_reference": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch"
},
"product_reference": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch"
},
"product_reference": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64"
},
"product_reference": "rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch"
},
"product_reference": "rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
},
"product_reference": "rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8116",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868196"
}
],
"notes": [
{
"category": "description",
"text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-dot-prop: prototype pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8116"
},
{
"category": "external",
"summary": "RHBZ#1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/719856",
"url": "https://hackerone.com/reports/719856"
}
],
"release_date": "2020-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-12T09:44:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5086"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-dot-prop: prototype pollution"
},
{
"cve": "CVE-2020-8201",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879311"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js, where affected Node.js versions converted carriage returns in HTTP request headers to a hyphen before parsing. This flaw leads to HTTP Request Smuggling as it is a non-standard interpretation of the header. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: HTTP request smuggling due to CR-to-Hyphen conversion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Node.js is included in Red Hat Quay as a dependency of Yarn, which is only used while building Red Hat Quay, and not during runtime.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8201"
},
{
"category": "external",
"summary": "RHBZ#1879311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8201",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8201"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-12T09:44:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5086"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: HTTP request smuggling due to CR-to-Hyphen conversion"
},
{
"cve": "CVE-2020-8252",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879315"
}
],
"notes": [
{
"category": "description",
"text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libuv: buffer overflow in realpath",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8252"
},
{
"category": "external",
"summary": "RHBZ#1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-12T09:44:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5086"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libuv: buffer overflow in realpath"
},
{
"cve": "CVE-2020-15095",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856875"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: sensitive information exposure through logs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15095"
},
{
"category": "external",
"summary": "RHBZ#1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095"
}
],
"release_date": "2020-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-12T09:44:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5086"
},
{
"category": "workaround",
"details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.",
"product_ids": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.src",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.4-3.el7.x86_64",
"7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.4-3.el7.noarch",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.aarch64",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.ppc64le",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.s390x",
"7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.6-12.18.4.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "npm: sensitive information exposure through logs"
}
]
}
RHSA-2020:4272
Vulnerability from csaf_redhat - Published: 2020-10-19 14:37 - Updated: 2026-01-06 00:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.18.4).\n\nSecurity Fix(es):\n\n* nodejs-dot-prop: prototype pollution (CVE-2020-8116)\n\n* nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201)\n\n* npm: Sensitive information exposure through logs (CVE-2020-15095)\n\n* libuv: buffer overflow in realpath (CVE-2020-8252)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The nodejs:12/development module is not installable (BZ#1883966)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:4272",
"url": "https://access.redhat.com/errata/RHSA-2020:4272"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "1879311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311"
},
{
"category": "external",
"summary": "1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "1883966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883966"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4272.json"
}
],
"title": "Red Hat Security Advisory: nodejs:12 security and bug fix update",
"tracking": {
"current_release_date": "2026-01-06T00:54:14+00:00",
"generator": {
"date": "2026-01-06T00:54:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2020:4272",
"initial_release_date": "2020-10-19T14:37:38+00:00",
"revision_history": [
{
"date": "2020-10-19T14:37:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-10-19T14:37:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T00:54:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=src\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src (nodejs:12)",
"product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src (nodejs:12)",
"product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.2.0%2B8361%2B192e434e?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"product": {
"name": "nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch (nodejs:12)",
"product_id": "nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-docs@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12)",
"product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12)",
"product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.2.0%2B8361%2B192e434e?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.2.0%2B8361%2B192e434e?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12)",
"product_id": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12)",
"product_id": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12)",
"product_id": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12)",
"product_id": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-devel@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12)",
"product_id": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.4-2.module%2Bel8.2.0%2B8361%2B192e434e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12)",
"product_id": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/npm@6.14.6-1.12.18.4.2.module%2Bel8.2.0%2B8361%2B192e434e?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:12:8020020201007080935:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
},
"product_reference": "nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
},
"product_reference": "nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
},
"product_reference": "nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
},
"product_reference": "nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12"
},
"product_reference": "nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
},
"product_reference": "nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12"
},
"product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12"
},
"product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12"
},
"product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12"
},
"product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64 (nodejs:12) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
},
"product_reference": "npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8116",
"cwe": {
"id": "CWE-471",
"name": "Modification of Assumed-Immutable Data (MAID)"
},
"discovery_date": "2020-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868196"
}
],
"notes": [
{
"category": "description",
"text": "A prototype pollution flaw was found in nodejs-dot-prop. The function set could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ paths. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-dot-prop: prototype pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth restricting access to the vulnerable dot-prop library to authenticated users only, therefore the impact is Low.\n\nRed Hat Openshift Container Storage 4 is not affected by this vulnerability, as it already includes patched version of dot-prop(v5.2.0) in noobaa-core container.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8116"
},
{
"category": "external",
"summary": "RHBZ#1868196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/719856",
"url": "https://hackerone.com/reports/719856"
}
],
"release_date": "2020-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T14:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4272"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-dot-prop: prototype pollution"
},
{
"cve": "CVE-2020-8201",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879311"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Node.js, where affected Node.js versions converted carriage returns in HTTP request headers to a hyphen before parsing. This flaw leads to HTTP Request Smuggling as it is a non-standard interpretation of the header. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: HTTP request smuggling due to CR-to-Hyphen conversion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Node.js is included in Red Hat Quay as a dependency of Yarn, which is only used while building Red Hat Quay, and not during runtime.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8201"
},
{
"category": "external",
"summary": "RHBZ#1879311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8201",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8201"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T14:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4272"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: HTTP request smuggling due to CR-to-Hyphen conversion"
},
{
"cve": "CVE-2020-8252",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879315"
}
],
"notes": [
{
"category": "description",
"text": "A flaw has been found in libuv. The realpath() implementation performs an incorrect calculation when allocating a buffer, leading to a potential buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libuv: buffer overflow in realpath",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "As shipped in Red Hat Software Collections (nodejs-10 \u0026 nodejs-12) as well as Red Hat Enterprise Linux 8 (nodejs-10 and nodejs-12), no incorrect use of the `UV__PATH_MAX` macro were found. Although the releases of libuv contained in these versions of nodejs are considered \"Affected\", it is considered not feasible to trigger the flaw.\n\nNodeJS is included in Red Hat Quay as a dependency of Yarn which is only used while building Red Hat Quay, and not during runtime.\n\nRed Hat Enterprise Linux 8 ships libuv-1.23.1, which is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8252"
},
{
"category": "external",
"summary": "RHBZ#1879315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8252",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8252"
}
],
"release_date": "2020-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T14:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4272"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libuv: buffer overflow in realpath"
},
{
"cve": "CVE-2020-15095",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2020-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856875"
}
],
"notes": [
{
"category": "description",
"text": "Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like \"\u003cprotocol\u003e://[\u003cuser\u003e[:\u003cpassword\u003e]@]\u003chostname\u003e[:\u003cport\u003e][:][/]\u003cpath\u003e\". The password value is not redacted and is printed to stdout and also to any generated log files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "npm: sensitive information exposure through logs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-15095"
},
{
"category": "external",
"summary": "RHBZ#1856875",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095"
}
],
"release_date": "2020-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-10-19T14:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:4272"
},
{
"category": "workaround",
"details": "Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead.",
"product_ids": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debuginfo-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-debugsource-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-devel-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-docs-1:12.18.4-2.module+el8.2.0+8361+192e434e.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-full-i18n-1:12.18.4-2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.aarch64::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.ppc64le::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.s390x::nodejs:12",
"AppStream-8.2.0.Z.MAIN.EUS:npm-1:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e.x86_64::nodejs:12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "npm: sensitive information exposure through logs"
}
]
}
FKIE_CVE-2020-8116
Vulnerability from fkie_nvd - Published: 2020-02-04 20:15 - Updated: 2024-11-21 05:38| URL | Tags | ||
|---|---|---|---|
| support@hackerone.com | https://github.com/advisories/GHSA-ff7x-qrg7-qggm | Third Party Advisory | |
| support@hackerone.com | https://github.com/sindresorhus/dot-prop/issues/63 | Issue Tracking, Patch, Third Party Advisory | |
| support@hackerone.com | https://github.com/sindresorhus/dot-prop/tree/v4 | Broken Link | |
| support@hackerone.com | https://hackerone.com/reports/719856 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/advisories/GHSA-ff7x-qrg7-qggm | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/sindresorhus/dot-prop/issues/63 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/sindresorhus/dot-prop/tree/v4 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/719856 | Exploit, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| dot-prop_project | dot-prop | * | |
| dot-prop_project | dot-prop | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "9EFF2C93-F28E-47DE-A654-0B614FB1D5B8",
"versionEndExcluding": "4.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "F8DD28C3-2237-4DD4-AAB4-455A93029B51",
"versionEndExcluding": "5.1.1",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects."
},
{
"lang": "es",
"value": "Una vulnerabilidad de contaminaci\u00f3n de prototipo en el paquete dot-prop npm en versiones anteriores a 4.2.1 y versiones 5.x anteriores a 5.1.1, permite a un atacante agregar propiedades arbitrarias en las construcciones del lenguaje JavaScript, tales como objetos"
}
],
"id": "CVE-2020-8116",
"lastModified": "2024-11-21T05:38:19.580",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-02-04T20:15:13.353",
"references": [
{
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
},
{
"source": "support@hackerone.com",
"tags": [
"Broken Link"
],
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/719856"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/719856"
}
],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-471"
}
],
"source": "support@hackerone.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-FF7X-QRG7-QGGM
Vulnerability from github – Published: 2020-07-29 20:56 – Updated: 2022-08-11 14:58Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "dot-prop"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "dot-prop"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.1.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-8116"
],
"database_specific": {
"cwe_ids": [
"CWE-1321",
"CWE-425",
"CWE-471"
],
"github_reviewed": true,
"github_reviewed_at": "2020-07-29T20:51:37Z",
"nvd_published_at": "2020-02-04T20:15:00Z",
"severity": "HIGH"
},
"details": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.",
"id": "GHSA-ff7x-qrg7-qggm",
"modified": "2022-08-11T14:58:19Z",
"published": "2020-07-29T20:56:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
},
{
"type": "WEB",
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
},
{
"type": "WEB",
"url": "https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2"
},
{
"type": "WEB",
"url": "https://github.com/sindresorhus/dot-prop/commit/c914124f418f55edea27928e89c94d931babe587"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/719856"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"type": "PACKAGE",
"url": "https://github.com/sindresorhus/dot-prop"
},
{
"type": "WEB",
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "dot-prop Prototype Pollution vulnerability"
}
WID-SEC-W-2023-1350
Vulnerability from csaf_certbund - Published: 2023-06-01 22:00 - Updated: 2025-11-18 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1350 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1350.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1350 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1350"
},
{
"category": "external",
"summary": "Splunk Enterprise Security Advisory SVD-2023-0613 vom 2023-06-01",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0613"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7008449 vom 2023-06-29",
"url": "https://www.ibm.com/support/pages/node/7008449"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0487-1 vom 2024-02-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0486-1 vom 2024-02-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin - November 18 2025",
"url": "https://confluence.atlassian.com/security/security-bulletin-november-18-2025-1671463469.html"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern",
"tracking": {
"current_release_date": "2025-11-18T23:00:00.000+00:00",
"generator": {
"date": "2025-11-19T09:42:52.592+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2023-1350",
"initial_release_date": "2023-06-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-02-15T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.1",
"product": {
"name": "Atlassian Confluence \u003c10.1.1",
"product_id": "T048680"
}
},
{
"category": "product_version",
"name": "10.1.1",
"product": {
"name": "Atlassian Confluence 10.1.1",
"product_id": "T048680-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:10.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.0.2",
"product": {
"name": "Atlassian Confluence \u003c10.0.2",
"product_id": "T048685"
}
},
{
"category": "product_version",
"name": "10.0.2",
"product": {
"name": "Atlassian Confluence 10.0.2",
"product_id": "T048685-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:10.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.7",
"product": {
"name": "Atlassian Confluence \u003c9.2.7",
"product_id": "T048686"
}
},
{
"category": "product_version",
"name": "9.2.7",
"product": {
"name": "Atlassian Confluence 9.2.7",
"product_id": "T048686-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:9.2.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.5.25",
"product": {
"name": "Atlassian Confluence \u003c8.5.25",
"product_id": "T048687"
}
},
{
"category": "product_version",
"name": "8.5.25",
"product": {
"name": "Atlassian Confluence 8.5.25",
"product_id": "T048687-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.5.25"
}
}
}
],
"category": "product_name",
"name": "Confluence"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM DB2",
"product": {
"name": "IBM DB2",
"product_id": "5104",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.1.14",
"product": {
"name": "Splunk Splunk Enterprise \u003c8.1.14",
"product_id": "T027935"
}
},
{
"category": "product_version",
"name": "8.1.14",
"product": {
"name": "Splunk Splunk Enterprise 8.1.14",
"product_id": "T027935-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:8.1.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.11",
"product": {
"name": "Splunk Splunk Enterprise \u003c8.2.11",
"product_id": "T027936"
}
},
{
"category": "product_version",
"name": "8.2.11",
"product": {
"name": "Splunk Splunk Enterprise 8.2.11",
"product_id": "T027936-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:8.2.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.5",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.5",
"product_id": "T027937"
}
},
{
"category": "product_version",
"name": "9.0.5",
"product": {
"name": "Splunk Splunk Enterprise 9.0.5",
"product_id": "T027937-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.5"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-16042",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2017-16042"
},
{
"cve": "CVE-2018-25032",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2019-10744",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2019-10744"
},
{
"cve": "CVE-2019-10746",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2019-10746"
},
{
"cve": "CVE-2019-20149",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2020-13822",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-13822"
},
{
"cve": "CVE-2020-15138",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-15138"
},
{
"cve": "CVE-2020-28469",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-7662",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-7662"
},
{
"cve": "CVE-2020-7753",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-7753"
},
{
"cve": "CVE-2020-7774",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8116",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8116"
},
{
"cve": "CVE-2020-8169",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2020-8177",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8203",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8203"
},
{
"cve": "CVE-2020-8231",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2021-20095",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-20095"
},
{
"cve": "CVE-2021-22876",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22876"
},
{
"cve": "CVE-2021-22890",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22890"
},
{
"cve": "CVE-2021-22897",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22898",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-22901",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-22922",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22923",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22924",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22924"
},
{
"cve": "CVE-2021-22925",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22926",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-22945",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22945"
},
{
"cve": "CVE-2021-22946",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2021-22947",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-23343",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-23343"
},
{
"cve": "CVE-2021-23368",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-23368"
},
{
"cve": "CVE-2021-23382",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-23382"
},
{
"cve": "CVE-2021-27292",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-27292"
},
{
"cve": "CVE-2021-29060",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-29060"
},
{
"cve": "CVE-2021-31566",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-31566"
},
{
"cve": "CVE-2021-33502",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-33502"
},
{
"cve": "CVE-2021-33503",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33587",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-33587"
},
{
"cve": "CVE-2021-3520",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-36976",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-36976"
},
{
"cve": "CVE-2021-3803",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-43565",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2022-1705",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1962",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-22576",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2022-23491",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-23491"
},
{
"cve": "CVE-2022-23772",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-23806",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-23806"
},
{
"cve": "CVE-2022-24675",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-24675"
},
{
"cve": "CVE-2022-24921",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-24921"
},
{
"cve": "CVE-2022-24999",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-24999"
},
{
"cve": "CVE-2022-25858",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-25858"
},
{
"cve": "CVE-2022-27191",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-27664",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-27774",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-27775",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-27776",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-27778",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27778"
},
{
"cve": "CVE-2022-27779",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27779"
},
{
"cve": "CVE-2022-27780",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27780"
},
{
"cve": "CVE-2022-27781",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-28131",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-28327",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2879",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-29526",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29804",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-29804"
},
{
"cve": "CVE-2022-30115",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-30580",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30629",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30629"
},
{
"cve": "CVE-2022-30630",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-30634",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30634"
},
{
"cve": "CVE-2022-30635",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-31129",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-32148",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32189",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32205",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-33987",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-33987"
},
{
"cve": "CVE-2022-3517",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-35252",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-35260",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-35260"
},
{
"cve": "CVE-2022-35737",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36227",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-36227"
},
{
"cve": "CVE-2022-37434",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37599",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-37599"
},
{
"cve": "CVE-2022-37601",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-37601"
},
{
"cve": "CVE-2022-37603",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-37603"
},
{
"cve": "CVE-2022-37616",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-37616"
},
{
"cve": "CVE-2022-38900",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-38900"
},
{
"cve": "CVE-2022-40023",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-40023"
},
{
"cve": "CVE-2022-40303",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-41715",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41716",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-41716"
},
{
"cve": "CVE-2022-41720",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-4200",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-4200"
},
{
"cve": "CVE-2022-42004",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42915",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-42915"
},
{
"cve": "CVE-2022-42916",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-4304",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43551",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-43552",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-46175",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2023-0215",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-1370",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-23914",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-27533",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27537",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-27537"
},
{
"cve": "CVE-2023-27538",
"product_status": {
"known_affected": [
"T027937",
"T002207",
"T027935",
"T027936",
"T048680",
"5104",
"T048685",
"T048687",
"T048686"
]
},
"release_date": "2023-06-01T22:00:00.000+00:00",
"title": "CVE-2023-27538"
}
]
}
GSD-2020-8116
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-8116",
"description": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.",
"id": "GSD-2020-8116",
"references": [
"https://access.redhat.com/errata/RHSA-2021:0548",
"https://access.redhat.com/errata/RHSA-2021:0521",
"https://access.redhat.com/errata/RHSA-2020:5086",
"https://access.redhat.com/errata/RHSA-2020:4903",
"https://access.redhat.com/errata/RHSA-2020:4272",
"https://linux.oracle.com/cve/CVE-2020-8116.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-8116"
],
"details": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.",
"id": "GSD-2020-8116",
"modified": "2023-12-13T01:21:54.260482Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"ID": "CVE-2020-8116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "dot-prop",
"version": {
"version_data": [
{
"version_value": "before 4.2.1"
},
{
"version_value": "5.x before 5.1.1"
},
{
"version_value": "Fixed in 5.1.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Modification of Assumed-Immutable Data (MAID) (CWE-471)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/719856",
"refsource": "MISC",
"url": "https://hackerone.com/reports/719856"
},
{
"name": "https://github.com/sindresorhus/dot-prop/tree/v4",
"refsource": "MISC",
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"name": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm",
"refsource": "MISC",
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
},
{
"name": "https://github.com/sindresorhus/dot-prop/issues/63",
"refsource": "MISC",
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c4.2.1||\u003e=5.0.0 \u003c5.1.1",
"affected_versions": "All versions before 4.2.1, all versions starting from 5.0.0 before 5.1.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"cwe_ids": [
"CWE-1035",
"CWE-425",
"CWE-937"
],
"date": "2021-12-22",
"description": "Prototype pollution vulnerability in dot-prop npm package version allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.",
"fixed_versions": [
"4.2.1",
"5.1.1"
],
"identifier": "CVE-2020-8116",
"identifiers": [
"CVE-2020-8116",
"GHSA-ff7x-qrg7-qggm"
],
"not_impacted": "All versions starting from 4.2.1 before 5.0.0, all versions starting from 5.1.1",
"package_slug": "npm/dot-prop",
"pubdate": "2020-02-04",
"solution": "Upgrade to versions 4.2.1, 5.1.1 or above.",
"title": "Direct Request (Forced Browsing)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-8116"
],
"uuid": "da820ca1-f0b5-4194-b3cd-bc3277d0aaf4"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "5.1.1",
"versionStartIncluding": "5.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:dot-prop_project:dot-prop:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "4.2.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve-assignments@hackerone.com",
"ID": "CVE-2020-8116"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://hackerone.com/reports/719856",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/719856"
},
{
"name": "https://github.com/sindresorhus/dot-prop/issues/63",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sindresorhus/dot-prop/issues/63"
},
{
"name": "https://github.com/sindresorhus/dot-prop/tree/v4",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://github.com/sindresorhus/dot-prop/tree/v4"
},
{
"name": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-ff7x-qrg7-qggm"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
},
"lastModifiedDate": "2022-08-05T19:32Z",
"publishedDate": "2020-02-04T20:15Z"
}
}
}
CERTFR-2022-AVI-278
Vulnerability from certfr_avis - Published: 2022-03-29 - Updated: 2022-04-04
De multiples vulnérabilités ont été découvertes dans IBM Spectrum discover. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Discover versions 2.0.4.X ant\u00e9rieures \u00e0 2.0.4.5",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7751"
},
{
"name": "CVE-2019-20477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20477"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2020-28498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28498"
},
{
"name": "CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"name": "CVE-2020-7699",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7699"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2020-7720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7720"
},
{
"name": "CVE-2013-7459",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7459"
},
{
"name": "CVE-2021-23369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23369"
},
{
"name": "CVE-2019-19919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19919"
},
{
"name": "CVE-2020-13822",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13822"
},
{
"name": "CVE-2020-7608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7608"
},
{
"name": "CVE-2021-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41092"
},
{
"name": "CVE-2019-20922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20922"
},
{
"name": "CVE-2018-6594",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6594"
},
{
"name": "CVE-2020-7660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2019-20920",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20920"
},
{
"name": "CVE-2021-23383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23383"
},
{
"name": "CVE-2021-3918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3918"
},
{
"name": "CVE-2022-0122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0122"
},
{
"name": "CVE-2021-43616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43616"
}
],
"initial_release_date": "2022-03-29T00:00:00",
"last_revision_date": "2022-04-04T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-278",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-29T00:00:00.000000"
},
{
"description": "ajout avis \u00e9diteur du 31 mars 2022 et CVE CVE-2021-41092",
"revision_date": "2022-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Spectrum\ndiscover. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Spectrum discover",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6566889 du 28 mars 2022",
"url": "https://www.ibm.com/support/pages/node/6566889"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6568675 du 31 mars 2022",
"url": "https://www.ibm.com/support/pages/node/6568675"
}
]
}
CERTFR-2023-AVI-0428
Vulnerability from certfr_avis - Published: 2023-06-02 - Updated: 2023-06-02
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | N/A | Splunk Universal Forwarders versions 8.2.x antérieures à 8.2.11 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions antérieures à 8.1.14 | ||
| Splunk | N/A | Splunk App for Lookup File Editing versions antérieures à 4.0.1 | ||
| Splunk | N/A | Splunk App for Stream versions antérieures à 8.1.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.5 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.0.2303.100 | ||
| Splunk | N/A | Splunk Universal Forwarders versions 9.0.x antérieures à 9.0.5 | ||
| Splunk | N/A | Splunk Universal Forwarders versions antérieures à 8.1.14 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 8.2.x antérieures à 8.2.11 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Universal Forwarders versions 8.2.x ant\u00e9rieures \u00e0 8.2.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions ant\u00e9rieures \u00e0 8.1.14",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk App for Lookup File Editing versions ant\u00e9rieures \u00e0 4.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk App for Stream versions ant\u00e9rieures \u00e0 8.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2303.100",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarders versions 9.0.x ant\u00e9rieures \u00e0 9.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarders versions ant\u00e9rieures \u00e0 8.1.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.11",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2020-7753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7753"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2020-8116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
},
{
"name": "CVE-2022-35260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2021-33502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2022-27778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-32715",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32715"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2021-27292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27292"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-33987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2023-32717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32717"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2023-32708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32708"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2021-33587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33587"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2020-13822",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13822"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2021-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20095"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2021-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
},
{
"name": "CVE-2023-32716",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32716"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2023-32711",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32711"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-40023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2023-32712",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32712"
},
{
"name": "CVE-2022-4200",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4200"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2021-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2023-32710",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32710"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2019-20149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2017-16042",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16042"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2023-32706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32706"
},
{
"name": "CVE-2019-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10746"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2020-15138",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15138"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"name": "CVE-2021-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2023-32709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32709"
},
{
"name": "CVE-2022-37616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37616"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2020-7662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7662"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2023-32707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32707"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-32713",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32713"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2023-32714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32714"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"initial_release_date": "2023-06-02T00:00:00",
"last_revision_date": "2023-06-02T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0428",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eSplunk\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0603 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0609 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0609"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0607 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0602 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0613 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0613"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0608 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0608"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0610 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0610"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0611 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0614 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0601 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0605 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0605"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0606 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0615 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0604 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0612 du 01 juin 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-0612"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.