Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22884
Vulnerability from cvelistv5
Published
2021-03-03 17:37
Modified
2024-08-03 18:58
Severity ?
EPSS score ?
Summary
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | https://github.com/nodejs/node |
Version: Fixed in 10.24.0, 12.21.0, 14.16.0, 15.10.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:24.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1069487" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "name": "FEDORA-2021-a760169c3c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "name": "FEDORA-2021-f6bd75e9d4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "name": "FEDORA-2021-6aaba80ba2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/nodejs/node", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in 10.24.0, 12.21.0, 14.16.0, 15.10.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-350", "description": "Reliance on Reverse DNS Resolution for a Security-Critical Action (CWE-350)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T14:08:07", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1069487" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "name": "FEDORA-2021-a760169c3c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "name": "FEDORA-2021-f6bd75e9d4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "name": "FEDORA-2021-6aaba80ba2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22884", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/nodejs/node", "version": { "version_data": [ { "version_value": "Fixed in 10.24.0, 12.21.0, 14.16.0, 15.10.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reliance on Reverse DNS Resolution for a Security-Critical Action (CWE-350)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1069487", "refsource": "MISC", "url": "https://hackerone.com/reports/1069487" }, { "name": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "name": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "name": "FEDORA-2021-a760169c3c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "name": "FEDORA-2021-f6bd75e9d4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "name": "FEDORA-2021-6aaba80ba2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210723-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22884", "datePublished": "2021-03-03T17:37:46", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:24.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-22884\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2021-03-03T18:15:14.957\",\"lastModified\":\"2024-11-21T05:50:50.180\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.\"},{\"lang\":\"es\",\"value\":\"Node.js versiones anteriores a 10.24.0, 12.21.0, 14.16.0 y 15.10.0, es vulnerable a unos ataques de reenlace de DNS, ya que la lista blanca incluye \u201clocalhost6\u201d.\u0026#xa0;Cuando \u201clocalhost6\u201d no est\u00e1 presente en el archivo /etc/hosts, es solo un dominio ordinario que es resuelto por medio de DNS, es decir, a trav\u00e9s de la red.\u0026#xa0;Si el atacante controla el servidor DNS de la v\u00edctima o puede falsificar sus respuestas, la protecci\u00f3n de reenlace de DNS se puede omitir usando el dominio \\\"localhost6\\\".\u0026#xa0;Siempre que el atacante use el dominio \\\"localhost6\\\", a\u00fan puede aplicar el ataque descrito en el CVE-2018-7160\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-350\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.24.0\",\"matchCriteriaId\":\"0B8440E6-CAF3-456D-A9B4-4EBF33AC3F37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.21.0\",\"matchCriteriaId\":\"4533F19F-C946-4203-8331-0317A0544D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndExcluding\":\"14.16.0\",\"matchCriteriaId\":\"EB0738FA-DE42-4E1A-A67D-4C6357C2D720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndExcluding\":\"15.10.0\",\"matchCriteriaId\":\"E640EA36-17B2-4745-A831-AB8655F3579D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B8DB06-590A-4008-B0AB-FCD1401C77C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"058C7C4B-D692-49DE-924A-C2725A8162D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"0F0434A5-F2A1-4973-917C-A95F2ABE97D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"96DD93E0-274E-4C36-99F3-EEF085E57655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.2.6.0\",\"matchCriteriaId\":\"86305E47-33E9-411C-B932-08C395C09982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.25\",\"matchCriteriaId\":\"1FD765AD-DEE4-41C5-9746-A2294D5F21C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.3\",\"matchCriteriaId\":\"D04565AE-D092-4AE0-8FEE-0E8114662A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8AF00C6-B97F-414D-A8DF-057E6BFD8597\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/1069487\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210416-0001/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210723-0001/\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"support@hackerone.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/1069487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210416-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210723-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_0734
Vulnerability from csaf_redhat
Published
2021-03-04 16:03
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.21.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0734", "url": "https://access.redhat.com/errata/RHSA-2021:0734" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0734.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-13T22:19:11+00:00", "generator": { "date": "2024-11-13T22:19:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0734", "initial_release_date": "2021-03-04T16:03:58+00:00", "revision_history": [ { "date": "2021-03-04T16:03:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-04T16:03:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8030020210302104621:229f0a1c", "product": { "name": "nodejs:12:8030020210302104621:229f0a1c", "product_id": "nodejs:12:8030020210302104621:229f0a1c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8030020210302104621:229f0a1c" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "product": { "name": "nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "product_id": "nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B9715%2B1718613f?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_id": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "product": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "product_id": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B9715%2B1718613f?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_id": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_id": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_id": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.3.0%2B10191%2B34fb5a07?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, "product_reference": "nodejs:12:8030020210302104621:229f0a1c", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch" }, "product_reference": "nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64 as a component of nodejs:12:8030020210302104621:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-04T16:03:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0734" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-04T16:03:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0734" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debuginfo-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-debugsource-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-devel-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-docs-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-full-i18n-1:12.21.0-1.module+el8.3.0+10191+34fb5a07.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+9715+1718613f.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:12:8030020210302104621:229f0a1c:npm-1:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0744
Vulnerability from csaf_redhat
Published
2021-03-08 10:36
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:14 security and bug fix update
Notes
Topic
An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.16.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Node.js should not be built with "--debug-nghttp2" (BZ#1932427)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (14.16.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Node.js should not be built with \"--debug-nghttp2\" (BZ#1932427)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0744", "url": "https://access.redhat.com/errata/RHSA-2021:0744" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "1932427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932427" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0744.json" } ], "title": "Red Hat Security Advisory: nodejs:14 security and bug fix update", "tracking": { "current_release_date": "2024-11-13T22:19:30+00:00", "generator": { "date": "2024-11-13T22:19:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0744", "initial_release_date": "2021-03-08T10:36:40+00:00", "revision_history": [ { "date": "2021-03-08T10:36:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-08T10:36:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:14:8030020210301172147:229f0a1c", "product": { "name": "nodejs:14:8030020210301172147:229f0a1c", "product_id": "nodejs:14:8030020210301172147:229f0a1c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@14:8030020210301172147:229f0a1c" } } }, { "category": "product_version", "name": "nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "product": { "name": "nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "product_id": "nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_id": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_id": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_id": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_id": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_id": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "product": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_id": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.14.16.0.2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "product": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "product_id": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_id": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_id": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_id": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_id": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_id": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_id": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.14.16.0.2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_id": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_id": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_id": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_id": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_id": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "product": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "product_id": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.14.16.0.2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_id": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_id": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_id": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_id": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_id": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.16.0-2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64", "product": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_id": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.14.16.0.2.module%2Bel8.3.0%2B10180%2Bb92e1eb6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, "product_reference": "nodejs:14:8030020210301172147:229f0a1c", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64" }, "product_reference": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le" }, "product_reference": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x" }, "product_reference": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src" }, "product_reference": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64" }, "product_reference": "nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64" }, "product_reference": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le" }, "product_reference": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x" }, "product_reference": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64" }, "product_reference": "nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64" }, "product_reference": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le" }, "product_reference": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x" }, "product_reference": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64" }, "product_reference": "nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64" }, "product_reference": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le" }, "product_reference": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x" }, "product_reference": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64" }, "product_reference": "nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch" }, "product_reference": "nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64" }, "product_reference": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le" }, "product_reference": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x" }, "product_reference": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64" }, "product_reference": "nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64" }, "product_reference": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le" }, "product_reference": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x" }, "product_reference": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64 as a component of nodejs:14:8030020210301172147:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" }, "product_reference": "npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:36:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0744" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:36:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0744" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debuginfo-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-debugsource-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-devel-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-docs-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-full-i18n-1:14.16.0-2.module+el8.3.0+10180+b92e1eb6.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:14:8030020210301172147:229f0a1c:npm-1:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0735
Vulnerability from csaf_redhat
Published
2021-03-04 16:08
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.24.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0735", "url": "https://access.redhat.com/errata/RHSA-2021:0735" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0735.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-13T22:19:03+00:00", "generator": { "date": "2024-11-13T22:19:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0735", "initial_release_date": "2021-03-04T16:08:40+00:00", "revision_history": [ { "date": "2021-03-04T16:08:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-04T16:08:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8030020210225164533:229f0a1c", "product": { "name": "nodejs:10:8030020210225164533:229f0a1c", "product_id": "nodejs:10:8030020210225164533:229f0a1c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8030020210225164533:229f0a1c" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "product": { "name": "nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "product_id": "nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_id": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "product": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "product_id": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_id": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_id": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_id": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.3.0%2B10166%2Bb07ac28e?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, "product_reference": "nodejs:10:8030020210225164533:229f0a1c", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch" }, "product_reference": "nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64 as a component of nodejs:10:8030020210225164533:229f0a1c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-04T16:08:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0735" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-04T16:08:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0735" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debuginfo-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-debugsource-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-devel-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-docs-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-full-i18n-1:10.24.0-1.module+el8.3.0+10166+b07ac28e.x86_64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.aarch64", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.ppc64le", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.s390x", "AppStream-8.3.0.Z.MAIN:nodejs:10:8030020210225164533:229f0a1c:npm-1:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0831
Vulnerability from csaf_redhat
Published
2021-03-15 14:59
Modified
2024-11-13 22:20
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.21.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0831", "url": "https://access.redhat.com/errata/RHSA-2021:0831" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0831.json" } ], "title": "Red Hat Security Advisory: rh-nodejs12-nodejs security update", "tracking": { "current_release_date": "2024-11-13T22:20:01+00:00", "generator": { "date": "2024-11-13T22:20:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0831", "initial_release_date": "2021-03-15T14:59:59+00:00", "revision_history": [ { "date": "2021-03-15T14:59:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-15T14:59:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:20:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "product_id": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.21.0-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.21.0-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.21.0-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "product": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "product_id": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.11-12.21.0.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.21.0-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.21.0-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.21.0-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "product": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "product_id": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.11-12.21.0.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.21.0-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.21.0-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.21.0-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "product": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "product_id": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.11-12.21.0.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.21.0-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.21.0-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-15T14:59:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0831" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-15T14:59:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0831" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-debuginfo-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-devel-0:12.21.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs12-nodejs-docs-0:12.21.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs12-npm-0:6.14.11-12.21.0.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0738
Vulnerability from csaf_redhat
Published
2021-03-08 10:27
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.24.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0738", "url": "https://access.redhat.com/errata/RHSA-2021:0738" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0738.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-13T22:19:17+00:00", "generator": { "date": "2024-11-13T22:19:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0738", "initial_release_date": "2021-03-08T10:27:55+00:00", "revision_history": [ { "date": "2021-03-08T10:27:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-08T10:27:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8020020210225153906:4cda2c84", "product": { "name": "nodejs:10:8020020210225153906:4cda2c84", "product_id": "nodejs:10:8020020210225153906:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8020020210225153906:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "product": { "name": "nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "product_id": "nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_id": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.2.0%2B10165%2B019e8570?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "product": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "product_id": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_id": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.2.0%2B10165%2B019e8570?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_id": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.2.0%2B10165%2B019e8570?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_id": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.2.0%2B10165%2B019e8570?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.2.0%2B10165%2B019e8570?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, "product_reference": "nodejs:10:8020020210225153906:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch" }, "product_reference": "nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64 as a component of nodejs:10:8020020210225153906:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0738" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0738" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debuginfo-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-debugsource-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-devel-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-docs-1:10.24.0-1.module+el8.2.0+10165+019e8570.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-full-i18n-1:10.24.0-1.module+el8.2.0+10165+019e8570.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.s390x", "AppStream-8.2.0.Z.EUS:nodejs:10:8020020210225153906:4cda2c84:npm-1:6.14.11-1.10.24.0.1.module+el8.2.0+10165+019e8570.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0741
Vulnerability from csaf_redhat
Published
2021-03-08 10:23
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.24.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0741", "url": "https://access.redhat.com/errata/RHSA-2021:0741" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0741.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-13T22:19:23+00:00", "generator": { "date": "2024-11-13T22:19:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0741", "initial_release_date": "2021-03-08T10:23:18+00:00", "revision_history": [ { "date": "2021-03-08T10:23:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-08T10:23:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8010020210225115101:c27ad7f8", "product": { "name": "nodejs:10:8010020210225115101:c27ad7f8", "product_id": "nodejs:10:8010020210225115101:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8010020210225115101:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "product": { "name": "nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "product_id": "nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_id": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "product": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "product_id": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_id": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_id": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_id": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_id": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_id": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_id": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_id": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.24.0-1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64", "product": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64", "product_id": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.10.24.0.1.module%2Bel8.1.0%2B10161%2B5cffdac6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, "product_reference": "nodejs:10:8010020210225115101:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64" }, "product_reference": "nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64" }, "product_reference": "nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64" }, "product_reference": "nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch" }, "product_reference": "nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64 as a component of nodejs:10:8010020210225115101:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" }, "product_reference": "npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:23:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0741" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:23:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0741" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debuginfo-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-debugsource-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-devel-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-docs-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-full-i18n-1:10.24.0-1.module+el8.1.0+10161+5cffdac6.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020210225115101:c27ad7f8:npm-1:6.14.11-1.10.24.0.1.module+el8.1.0+10161+5cffdac6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0740
Vulnerability from csaf_redhat
Published
2021-03-08 10:31
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.21.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0740", "url": "https://access.redhat.com/errata/RHSA-2021:0740" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0740.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-13T22:19:37+00:00", "generator": { "date": "2024-11-13T22:19:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0740", "initial_release_date": "2021-03-08T10:31:43+00:00", "revision_history": [ { "date": "2021-03-08T10:31:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-08T10:31:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8020020210302112530:4cda2c84", "product": { "name": "nodejs:12:8020020210302112530:4cda2c84", "product_id": "nodejs:12:8020020210302112530:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8020020210302112530:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "product": { "name": "nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "product_id": "nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_id": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "product": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "product_id": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_id": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_id": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_id": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.2.0%2B10192%2B8959c43b?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, "product_reference": "nodejs:12:8020020210302112530:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch" }, "product_reference": "nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64 as a component of nodejs:12:8020020210302112530:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:31:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:31:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0740" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debuginfo-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-debugsource-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-devel-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-docs-1:12.21.0-1.module+el8.2.0+10192+8959c43b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-full-i18n-1:12.21.0-1.module+el8.2.0+10192+8959c43b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210302112530:4cda2c84:npm-1:6.14.11-1.12.21.0.1.module+el8.2.0+10192+8959c43b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0830
Vulnerability from csaf_redhat
Published
2021-03-15 14:55
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: rh-nodejs14-nodejs security update
Notes
Topic
An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.16.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.16.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0830", "url": "https://access.redhat.com/errata/RHSA-2021:0830" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0830.json" } ], "title": "Red Hat Security Advisory: rh-nodejs14-nodejs security update", "tracking": { "current_release_date": "2024-11-13T22:19:53+00:00", "generator": { "date": "2024-11-13T22:19:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0830", "initial_release_date": "2021-03-15T14:55:59+00:00", "revision_history": [ { "date": "2021-03-15T14:55:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-15T14:55:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "product": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "product_id": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.16.0-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.16.0-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.16.0-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "product": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "product_id": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.11-14.16.0.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.16.0-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.16.0-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.16.0-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "product": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "product_id": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.11-14.16.0.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.16.0-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.16.0-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.16.0-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "product": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "product_id": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.11-14.16.0.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.16.0-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "product": { "name": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "product_id": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.16.0-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-15T14:55:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0830" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-15T14:55:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0830" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-debuginfo-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-devel-0:14.16.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs14-nodejs-docs-0:14.16.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs14-npm-0:6.14.11-14.16.0.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0827
Vulnerability from csaf_redhat
Published
2021-03-15 14:53
Modified
2024-11-13 22:20
Summary
Red Hat Security Advisory: rh-nodejs10-nodejs security update
Notes
Topic
An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.24.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0827", "url": "https://access.redhat.com/errata/RHSA-2021:0827" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0827.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2024-11-13T22:20:08+00:00", "generator": { "date": "2024-11-13T22:20:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0827", "initial_release_date": "2021-03-15T14:53:04+00:00", "revision_history": [ { "date": "2021-03-15T14:53:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-15T14:53:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:20:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.24.0-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.24.0-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.24.0-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.11-10.24.0.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.24.0-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.24.0-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.24.0-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.11-10.24.0.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.24.0-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.24.0-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.24.0-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.11-10.24.0.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.24.0-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.24.0-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.6" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-15T14:53:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0827" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-15T14:53:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0827" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.6.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6-7.7.Z:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Server-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Server-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.src", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-debuginfo-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-devel-0:10.24.0-1.el7.x86_64", "7Workstation-RHSCL-3.6:rh-nodejs10-nodejs-docs-0:10.24.0-1.el7.noarch", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.ppc64le", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.s390x", "7Workstation-RHSCL-3.6:rh-nodejs10-npm-0:6.14.11-10.24.0.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
rhsa-2021_0739
Vulnerability from csaf_redhat
Published
2021-03-08 10:18
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.21.0).\n\nSecurity Fix(es):\n\n* nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion (CVE-2021-22883)\n\n* nodejs: DNS rebinding in --inspect (CVE-2021-22884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0739", "url": "https://access.redhat.com/errata/RHSA-2021:0739" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0739.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-13T22:19:44+00:00", "generator": { "date": "2024-11-13T22:19:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0739", "initial_release_date": "2021-03-08T10:18:18+00:00", "revision_history": [ { "date": "2021-03-08T10:18:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-08T10:18:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8010020210302113522:c27ad7f8", "product": { "name": "nodejs:12:8010020210302113522:c27ad7f8", "product_id": "nodejs:12:8010020210302113522:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8010020210302113522:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "product": { "name": "nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "product_id": "nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_id": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "product": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "product_id": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_id": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_id": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_id": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_id": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_id": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_id": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_id": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.21.0-1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64", "product": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64", "product_id": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.11-1.12.21.0.1.module%2Bel8.1.0%2B10194%2Bd5e49c90?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, "product_reference": "nodejs:12:8010020210302113522:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64" }, "product_reference": "nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64" }, "product_reference": "nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64" }, "product_reference": "nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch" }, "product_reference": "nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64 as a component of nodejs:12:8010020210302113522:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" }, "product_reference": "npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932014" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. When too many connection attempts with an \u0027unknownProtocol\u0027 are established a leak of file descriptors can occur leading to a potential denial of service. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening. If no file descriptor limit is configured, then this can lead to an excessive memory usage and cause the system to run out of memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22883" }, { "category": "external", "summary": "RHBZ#1932014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" } ], "release_date": "2021-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:18:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: HTTP2 \u0027unknownProtocol\u0027 cause DoS by resource exhaustion" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1932024" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. A denial of service is possible when the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS over the network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DNS rebinding in --inspect", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux ships with `localhost` and `localhost6` defined in `/etc/hosts`, and thus in general, would not be affected by this flaw, with some specific exceptions, such as :\n - `/etc/hosts` is disabled or has its default content (including `localhost6`) removed\n - the inspector is accessed using SSH tunneling from a remote computer that does not have `localhost6` statically defined\n\nRed Hat Quay from version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use the debug option (--inspect) and nodejs is only used at build time [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22884" }, { "category": "external", "summary": "RHBZ#1932024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" } ], "release_date": "2021-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-08T10:18:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0739" }, { "category": "workaround", "details": "Ensure that \u0027localhost6\u0027 is part of /etc/hosts.\ne.g.: \n\n```\n$ grep localhost6 /etc/hosts\n::1 localhost localhost.localdomain localhost6 localhost6.localdomain6\n```", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debuginfo-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-debugsource-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-devel-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-docs-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-full-i18n-1:12.21.0-1.module+el8.1.0+10194+d5e49c90.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210302113522:c27ad7f8:npm-1:6.14.11-1.12.21.0.1.module+el8.1.0+10194+d5e49c90.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DNS rebinding in --inspect" } ] }
icsa-22-069-09
Vulnerability from csaf_cisa
Published
2022-03-10 00:00
Modified
2022-03-10 00:00
Summary
Siemens SINEC INS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways.
Critical infrastructure sectors
Energy
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target this vulnerability.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt" } ], "title": "Siemens SINEC INS", "tracking": { "current_release_date": "2022-03-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-069-09", "initial_release_date": "2022-03-10T00:00:00.000000Z", "revision_history": [ { "date": "2022-03-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-069-09 Siemens SINEC INS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.0.1.1", "product": { "name": "SINEC INS", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SINEC INS" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19242 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19242 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19242" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19317" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19603" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19645" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19646" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19880" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8169" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8231" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8284" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8285" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8286" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8625" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9327" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13630" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13631" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13632" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13871" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15358" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22890" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22897" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22901" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22921" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25214" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25215" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25216" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25219" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39134" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39135" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19244 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19244 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19317 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19603 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19603 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19645 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19645 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19646 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19646 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19880 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19880 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-1971 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-1971 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "notes": [ { "category": "summary", "text": "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require(\u0027y18n\u0027)(); y18n.setLocale(\u0027PROTO\u0027); y18n.updateLocale({polluted: true}); console.log(polluted); // true", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-7774 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-7774 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8169 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8169 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8177 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8177 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8231 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8231 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8265 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8265 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8265" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8284 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8284 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8285 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8285 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8286 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8286 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8287 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8287 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8287" }, { "cve": "CVE-2020-8625", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -\u003e 9.11.27, 9.12.0 -\u003e 9.16.11, and versions BIND 9.11.3-S1 -\u003e 9.11.27-S1 and 9.16.8-S1 -\u003e 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8625 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8625 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8625" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-9327 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-9327 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11655 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11655 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11656 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11656 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13630 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13630 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13631 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13631 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13632 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13632 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13871 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13871 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-15358 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-15358 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-3449", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3449 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3449 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3450 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3450 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3672 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3672 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3672" }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3711 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3711 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22876 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22876 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an \u0027unknownProtocol\u0027 are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22883 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22883 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22883" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22884 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22884 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22884" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22890 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22890 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22897 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22897 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22898 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22898 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22901 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22901 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22918 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22918 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22918" }, { "cve": "CVE-2021-22921", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22921 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22921 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22921" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22922 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22922 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22930 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22930 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22930" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22931 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22931 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22931" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22939 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22939 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22939" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22940 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22940 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22940" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22945 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22945 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22946 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22946 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22947 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22947 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23362 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23362 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23840 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23840 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2021-25214", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.8.5 -\u003e 9.8.8, 9.9.3 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25214 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25214 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25214" }, { "cve": "CVE-2021-25215", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.0.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25215 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25215 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25215" }, { "cve": "CVE-2021-25216", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.5.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.11.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25216 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25216 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25216" }, { "cve": "CVE-2021-25219", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In BIND 9.3.0 -\u003e 9.11.35, 9.12.0 -\u003e 9.16.21, and versions 9.9.3-S1 -\u003e 9.11.35-S1 and 9.16.8-S1 -\u003e 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25219 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25219 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25219" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-27290 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-27290 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-27290" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32803 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32803 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32804 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32804 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37701 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37701 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37713 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37713 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37713" }, { "cve": "CVE-2021-39134", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist\u0027s internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39134 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39134 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39134" }, { "cve": "CVE-2021-39135", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project\u0027s node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39135 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39135 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39135" } ] }
ghsa-2w6h-7cgj-qw4q
Vulnerability from github
Published
2022-05-24 22:28
Modified
2022-05-24 22:28
Severity ?
Summary
Node.js bad
Details
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
{ "affected": [], "aliases": [ "CVE-2021-22884" ], "database_specific": { "cwe_ids": [ "CWE-506" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-03-03T18:15:00Z", "severity": "HIGH" }, "details": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "id": "GHSA-2w6h-7cgj-qw4q", "modified": "2022-05-24T22:28:05Z", "published": "2022-05-24T22:28:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" }, { "type": "WEB", "url": "https://hackerone.com/reports/1069487" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ" }, { "type": "WEB", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases" }, { "type": "WEB", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210416-0001" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210723-0001" }, { "type": "WEB", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Node.js bad" }
wid-sec-w-2023-0485
Vulnerability from csaf_certbund
Published
2021-02-23 23:00
Modified
2024-05-09 22:00
Summary
Node.js: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0485 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-0485.json" }, { "category": "self", "summary": "WID-SEC-2023-0485 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0485" }, { "category": "external", "summary": "Node.js Security Release vom 2021-02-23", "url": "https://github.com/nodejs/node/releases" }, { "category": "external", "summary": "Debian Security Advisory DSA-4863 vom 2021-02-25", "url": "https://www.debian.org/security/2021/dsa-4863" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0649-1 vom 2021-02-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0648-1 vom 2021-02-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008395.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0650-1 vom 2021-02-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008391.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0651-1 vom 2021-02-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0673-1 vom 2021-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0674-1 vom 2021-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0686-1 vom 2021-03-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008419.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0734 vom 2021-03-04", "url": "https://access.redhat.com/errata/RHSA-2021:0734" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0735 vom 2021-03-04", "url": "https://access.redhat.com/errata/RHSA-2021:0735" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0735 vom 2021-03-05", "url": "https://linux.oracle.com/errata/ELSA-2021-0735.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0734 vom 2021-03-05", "url": "https://linux.oracle.com/errata/ELSA-2021-0734.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0738 vom 2021-03-08", "url": "https://access.redhat.com/errata/RHSA-2021:0738" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0739 vom 2021-03-08", "url": "https://access.redhat.com/errata/RHSA-2021:0739" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0740 vom 2021-03-08", "url": "https://access.redhat.com/errata/RHSA-2021:0740" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0741 vom 2021-03-08", "url": "https://access.redhat.com/errata/RHSA-2021:0741" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0744 vom 2021-03-08", "url": "https://access.redhat.com/errata/RHSA-2021:0744" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0744 vom 2021-03-09", "url": "https://linux.oracle.com/errata/ELSA-2021-0744.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0831 vom 2021-03-15", "url": "https://access.redhat.com/errata/RHSA-2021:0831" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0830 vom 2021-03-15", "url": "https://access.redhat.com/errata/RHSA-2021:0830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0827 vom 2021-03-15", "url": "https://access.redhat.com/errata/RHSA-2021:0827" }, { "category": "external", "summary": "HCL Article KB0090800 vom 2021-08-03", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0090800" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2620-1 vom 2021-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-110 vom 2023-02-28", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-110/index.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6418-1 vom 2023-10-05", "url": "https://ubuntu.com/security/notices/USN-6418-1" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-29 vom 2024-05-08", "url": "https://security.gentoo.org/glsa/202405-29" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-05-09T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:44:51.456+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0485", "initial_release_date": "2021-02-23T23:00:00.000+00:00", "revision_history": [ { "date": "2021-02-23T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-02-25T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-02-28T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-02T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-04T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-09T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-15T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-02T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2021-08-05T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-02-27T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-10-04T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-09T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "13" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HCL BigFix", "product": { "name": "HCL BigFix", "product_id": "T017494", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Analyzer \u003c10.9.1-00", "product": { "name": "Hitachi Ops Center Analyzer \u003c10.9.1-00", "product_id": "T026522" } } ], "category": "product_name", "name": "Ops Center" } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c15.10.0", "product": { "name": "Open Source Node.js \u003c15.10.0", "product_id": "T018441" } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22883", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Die Schwachstelle besteht, wenn kein Dateideskriptor-Limit konfiguriert ist. Dies f\u00fchrt zu einer \u00fcberm\u00e4\u00dfigen Speichernutzung und dem Verbrauchen des Speichers auf dem System. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand auszul\u00f6sen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T026522", "T012167", "T004914", "T017494" ] }, "release_date": "2021-02-23T23:00:00.000+00:00", "title": "CVE-2021-22883" }, { "cve": "CVE-2021-22884", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Die Schwachstelle tritt auf, wenn \"localhost6\" in der Whitelist enthalten ist. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um den DNS-Rebinding-Schutz zu umgehen und einen Denial-of-Service-Angriff auszul\u00f6sen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T026522", "T012167", "T004914" ] }, "release_date": "2021-02-23T23:00:00.000+00:00", "title": "CVE-2021-22884" } ] }
gsd-2021-22884
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-22884", "description": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "id": "GSD-2021-22884", "references": [ "https://www.suse.com/security/cve/CVE-2021-22884.html", "https://www.debian.org/security/2021/dsa-4863", "https://access.redhat.com/errata/RHSA-2021:0831", "https://access.redhat.com/errata/RHSA-2021:0830", "https://access.redhat.com/errata/RHSA-2021:0827", "https://access.redhat.com/errata/RHSA-2021:0744", "https://access.redhat.com/errata/RHSA-2021:0741", "https://access.redhat.com/errata/RHSA-2021:0740", "https://access.redhat.com/errata/RHSA-2021:0739", "https://access.redhat.com/errata/RHSA-2021:0738", "https://access.redhat.com/errata/RHSA-2021:0735", "https://access.redhat.com/errata/RHSA-2021:0734", "https://advisories.mageia.org/CVE-2021-22884.html", "https://security.archlinux.org/CVE-2021-22884", "https://linux.oracle.com/cve/CVE-2021-22884.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-22884" ], "details": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "id": "GSD-2021-22884", "modified": "2023-12-13T01:23:24.094615Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22884", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/nodejs/node", "version": { "version_data": [ { "version_value": "Fixed in 10.24.0, 12.21.0, 14.16.0, 15.10.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reliance on Reverse DNS Resolution for a Security-Critical Action (CWE-350)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1069487", "refsource": "MISC", "url": "https://hackerone.com/reports/1069487" }, { "name": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "name": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160", "refsource": "MISC", "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "name": "FEDORA-2021-a760169c3c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "name": "FEDORA-2021-f6bd75e9d4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "name": "FEDORA-2021-6aaba80ba2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210723-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.24.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "12.21.0", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "14.16.0", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "15.10.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.2.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "20.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve-assignments@hackerone.com", "ID": "CVE-2021-22884" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160", "refsource": "MISC", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/#node-js-inspector-dns-rebinding-vulnerability-cve-2018-7160" }, { "name": "https://hackerone.com/reports/1069487", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1069487" }, { "name": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/", "refsource": "MISC", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://nodejs.org/en/blog/vulnerability/february-2021-security-releases/" }, { "name": "FEDORA-2021-f6bd75e9d4", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F45Y7TXSU33MTKB6AGL2Q5V5ZOCNPKOG/" }, { "name": "FEDORA-2021-a760169c3c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4FRS5ZVK4ZQ7XIJQNGIKUXG2DJFHLO7/" }, { "name": "FEDORA-2021-6aaba80ba2", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSYFUGKFUSZ27M5TEZ3FKILWTWFJTFAZ/" }, { "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210723-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210723-0001/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9 } }, "lastModifiedDate": "2022-04-06T16:24Z", "publishedDate": "2021-03-03T18:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.