/
ALSA-2021:0551.json
109 lines (109 loc) · 3.32 KB
/
ALSA-2021:0551.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
{
"id": "ALSA-2021:0551",
"summary": "Moderate: nodejs:14 security and bug fix update",
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-nodemon"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.3-1.module_el8.4.0+2521+c668cc9f"
}
]
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "23-3.module_el8.5.0+254+b4526b16"
}
]
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nodejs-packaging"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "23-3.module_el8.4.0+2522+3bd42762"
}
]
}
]
}
],
"related": [
"CVE-2020-7754",
"CVE-2020-7774",
"CVE-2020-7788",
"CVE-2020-8265",
"CVE-2020-8277",
"CVE-2020-15366",
"CVE-2020-8287"
],
"published": "2021-02-16T07:34:42Z",
"modified": "2021-02-16T13:03:09Z",
"details": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.15.4).\n\nSecurity Fix(es):\n\n* nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs: use-after-free in the TLS implementation (CVE-2020-8265)\n\n* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* yarn install crashes with nodejs:14 on aarch64 (BZ#1916465)",
"references": [
{
"url": "https://errata.almalinux.org/8/ALSA-2021-0551.html",
"type": "ADVISORY"
},
{
"url": "https://vulners.com/cve/CVE-2020-15366",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-7754",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-7774",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-7788",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-8265",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-8277",
"type": "REPORT"
},
{
"url": "https://vulners.com/cve/CVE-2020-8287",
"type": "REPORT"
}
]
}