/
ALSA-2021:0549.json
127 lines (127 loc) · 3.5 KB
/
ALSA-2021:0549.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
{
"id": "ALSA-2021:0549",
"summary": "Moderate: nodejs:12 security update",
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-nodemon"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.3-1.module_el8.4.0+2521+c668cc9f"
}
]
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "17-3.module_el8.4.0+2224+b07ac28e"
}
]
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "17-3.module_el8.4.0+2521+c668cc9f"
}
]
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "17-3.module_el8.3.0+2023+d2377ea3"
}
]
}
]
}
],
"related": [
"CVE-2019-10746",
"CVE-2019-10747",
"CVE-2020-7754",
"CVE-2020-7788",
"CVE-2020-8265",
"CVE-2020-8287"
],
"published": "2021-02-16T07:34:29Z",
"modified": "2021-02-16T13:03:05Z",
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3).\n\nSecurity Fix(es):\n\n* nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746)\n\n* nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747)\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"references": [
{
"url": "https://errata.almalinux.org/8/ALSA-2021-0549.html",
"type": "ADVISORY"
},
{
"url": "https://vulners.com/cve/CVE-2018-3750",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2019-10746",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2019-10747",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-7754",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-7788",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-8265",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-8287",
"type": "REPORT"
}
]
}